Sökning: "Mark T. Smith"

Hittade 4 avhandlingar innehållade orden Mark T. Smith.

  1. 1. ERP adoption in small and medium sized enterprises

    Författare :Gustaf Juell-Skielse; Louise Yngström; Mark T. Smith; KTH; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; Enterprise Resource Planning; Enterprise Systems; Information Systems; Critical Succesfactors; Small and Medium Sized Enterprises; Information technology; Informationsteknik;

    Sammanfattning : Enterprise resource planning (ERP) is established among a majority of small and medium sized companies in Kista Science City and seems to have a positive effect on organizational effectiveness. Kista Science City is Sweden’s largest corporate centre, with more companies and employees in a limited area than anywhere else in Europe. LÄS MER

  2. 2. Towards a Person-Centric Context Aware System

    Författare :Wei Li; Carl Gustaf Jansson; Mark T. Smith; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Telecommunication; Telekommunikation;

    Sammanfattning : A recent trend is to integrate sensing, communication, and computation into every aspect of our daily life, ranging from various user devices to physical environment. The goal is to give computer systems an awareness of the users and their situations, so that they can support their diverse interaction needs at anytime, any place. LÄS MER

  3. 3. Topics in engineering methods for IT : Moving towards an interdisciplinary design space

    Författare :Jordi Solsona Belenguer; Mark T. Smith; Jonas Löwgren; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY;

    Sammanfattning : .... LÄS MER

  4. 4. Deep Learning Side-Channel Attacks on Advanced Encryption Standard

    Författare :Huanyu Wang; Elena Dubrova; Mark Smith; Francesco Regazzoni; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Side-channel attack; Deep learning; Advanced Encryption Standard; Hardware security; Informations- och kommunikationsteknik; Information and Communication Technology;

    Sammanfattning : Side-channel attacks (SCAs) have become one of the most realistic threats to implementations of cryptographic algorithms. By exploiting the nonprime, unintentional physical leakage, such as different amount of power consumed by the device during the execution of the cryptographic algorithm, SCAs are able to bypass the theoretical strength of cryptography and extract the secret key. LÄS MER