Sciweavers

1297 search results - page 178 / 260
» fews 2007
Sort
View
CTRSA
2008
Springer
134views Cryptology» more  CTRSA 2008»
14 years 11 months ago
An Efficient Protocol for Fair Secure Two-Party Computation
In the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withstanding semi-honest adversaries, which is based on so-called garbled circuits...
Mehmet S. Kiraz, Berry Schoenmakers
HICSS
2007
IEEE
165views Biometrics» more  HICSS 2007»
14 years 11 months ago
A Study on Developing CRM Scorecard
As more firms embrace CRM as a core business strategy, it is getting more important to assess firms’ CRM readiness and performance for diagnosing, guiding, managing, and evaluat...
Hyung-Su Kim, Young-Gul Kim
ICADL
2007
Springer
112views Education» more  ICADL 2007»
14 years 11 months ago
Humanities Graduate Students' Use Behavior on Full-Text Databases for Ancient Chinese Books
Digitizing ancient books, especially those related to the humanities, is practiced in many countries. The number of full-text databases in the humanities is increasing. Studies hav...
Ming-der Wu, Shih-chuan Chen
ICEIS
2007
IEEE
14 years 11 months ago
An information systems auditor's profile
The increasing dependence upon Information systems in the last few decades by businesses has resulted in concerns regarding auditing. IS auditing has changed from auditing “arou...
Mariana Carroll, Alta van der Merwe
IMC
2007
ACM
14 years 11 months ago
Usage-based dhcp lease time optimization
The Dynamic Host Configuration Protocol (DHCP) is used to dynamically allocate address space to hosts on a local area network. Despite its widespread usage, few studies exist on ...
Manas Khadilkar, Nick Feamster, Matt Sanders, Russ...