Showing 1 - 10 of 42
user interfaces to generate information to support business decision-making. BI is an important part of IT practice and is …
Persistent link: https://www.econbiz.de/10009434828
influenced by the behaviour ofother entities such as the submission time of user jobs. Finally, it is observedthat the … characteristics of entities have an effect on the performance of strategies.For example, the two user strategies that consider the …
Persistent link: https://www.econbiz.de/10009461233
While Business Process Management (BPM) is an established discipline, the increased adoption of BPM technology in recent years has introduced new challenges. One challenge concerns dealing with the ever-growing complexity of business process models. Mechanisms for dealing with this complexity...
Persistent link: https://www.econbiz.de/10009438242
Two recent examples of data from statistical consulting work form the basis of this paper. Both data sets arose from situations where temporal decay was expected, and different models for this are discussed, in particular, variants on simple exponential decay: hyperexponential (or mixed...
Persistent link: https://www.econbiz.de/10009448323
Spatial dependence in individual-tree diameter, and growth model residuals was characterised for an even-aged Eucalyptus pilularis (Smith) experiment in New South Wales,. Australia. The magnitude of spatial dependence changed as the dominance of competitive mechanisms and micro-site influences...
Persistent link: https://www.econbiz.de/10009448357
This paper describes a number of techniques for GNSS navigation message authentication. A detailed analysis of the … security facilitated by navigation message authentication is given. The analysis takes into consideration the risk of critical … cryptographic authentication schemes for navigation data authentication. These authentication schemes provide authenticity and …
Persistent link: https://www.econbiz.de/10009438385
websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later … is to present a conceptual model for authentication, data entry and transaction verification. It is suggested that the … to an attacker. The model is based on a graphical authentication application previously developed called Authentigraph. …
Persistent link: https://www.econbiz.de/10009440800
Since RFID tags are ubiquitous and at times even oblivious to thehuman user, all modern RFID protocols are designed to … resist tracking so that thelocation privacy of the human RFID user is not violated. Another design criterionfor RFIDs is the … reader’s signals. Along thisvein, a class of ultralightweight RFID authentication protocols has been designed,which uses only …
Persistent link: https://www.econbiz.de/10009461313
(Class1). To protect users and organization we are proposing an enhanced RFID mutual authentication scheme. In this protocol … we use authentication based on shared unique parameters as a method to protect privacy. This protocol will be capable of …
Persistent link: https://www.econbiz.de/10009483920
ensure the data privacy of a tag. The framework will use a sanitization technique with a mutual authentication in the reader … stop execution of the code in the RFIF system. Here shared unique parameters are used for authentication. It will be …
Persistent link: https://www.econbiz.de/10009483982