Keyword: computers: information
GOTCHA! Network-Based Fraud Detection for Social Security Fraud
We study the impact of network information for social security fraud detection. In a...
On the Information Ratio of Non-perfect Secret Sharing Schemes
A secret sharing scheme is non‐perfect if some subsets of players that cannot...
On Virtual Grey Box Obfuscation for General Circuits
An obfuscator O is Virtual Grey Box (VGB) for a class C of circuits if, for any C...
On the Impossibility of Cryptography with Tamperable Randomness
We initiate a study of the security of cryptographic primitives in the presence of...
Scalable Zero Knowledge Via Cycles of Elliptic Curves
Non‐interactive zero‐knowledge proofs of knowledge for general NP...
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
In this work, we show how to use indistinguishability obfuscation to build multiparty...
Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
A self‐bilinear map is a bilinear map where the domain and target groups are...
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
The notion of differing‐inputs obfuscation (diO) was introduced by Barak et al....
Towards value-driven strategies in pricing IT solutions
The objective of this paper is to discuss the challenges and opportunities involved in...
Application of mobile devices within distributed simulation-based decision making
As a consequence of the development of the market with information technology, where...
Design and implementation of communication patterns using parallel objects
Lpez Mario Rossainz
Within an environment of parallel objects, an approach of structured parallel...
Efficient Computation of Optimal Energy and Fractional Weighted Flow Trade-Off Schedules
We give a polynomial time algorithm to compute an optimal energy and fractional...
Towards an efficient IS service management: the internal customers' zone of tolerance
This article addresses the zone of tolerance (ZOT) as a diagnosis tool for...
Evaluating the impact of smart technologies on harbor’s logistics via BPMN modeling and simulation
A smart Information and Communication Technology (ICT) enables a synchronized...
Information systems in seaports: a categorization and overview
Information systems have become indispensable to the competitiveness of ports,...
A triadic link between knowledge management, information technology and business strategies
The extant literature shows that the connection between KM strategy and business...
Community of practices, knowledge transfer, and ERP project (ERPP)
In this research, we are interested in ERP systems which are common information...
The learning preferences of Enterprise System consultants: towards the preferred learning pattern
This paper presents the results of a combined quantitative–qualitative study...
Heuristic and exact algorithms for product configuration in software product lines
Noronha Thiago F
Software product line (SPL) is a set of software applications that share a common set...
An Empirical Comparison of Search Approaches for Moving Agents
This study empirically compares existing search approaches used for path planning of...
Improved Algorithms for Distributed Entropy Monitoring
Modern data management systems often need to deal with massive, dynamic and inherently...
Costly Control: An Examination of the Trade-off Between Control Investments and Residual Risk in Interfirm Transactions
Anderson Shannon W
Transaction cost economics predicts that investments in management control will enable...
Real options approach to explore the effect of organizational change on IoT development project
The emerging information technology of internet of things (IoT) has caught much...
Conditions for detecting a logical element fault in a combination device under concurrent checking based on Berger’s code
We formulate necessary and sufficient conditions for detecting a fault at the output...
Papers per page: