Sciweavers

Share
10 search results - page 1 / 2
» isf 2010
Sort
View
ISF
2010
232views more  ISF 2010»
10 years 11 months ago
Classifying RFID attacks and defenses
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew ...
ISF
2010
89views more  ISF 2010»
11 years 2 days ago
Alert based disaster notification and resource allocation
Dickson K. W. Chiu, Drake T. T. Lin, Eleanna Kafez...
ISF
2010
164views more  ISF 2010»
10 years 11 months ago
An SVM-based machine learning method for accurate internet traffic classification
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven t...
Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu
ISF
2010
109views more  ISF 2010»
11 years 2 days ago
From IT deployment capabilities to competitive advantage: An exploratory study in China
As more and more companies are deploying, or plan to deploy, information systems, the organizational capabilities to effectively deploy information technologies to support and shap...
Jun Tian, Kanliang Wang, Yan Chen, Björn Joha...
ISF
2010
109views more  ISF 2010»
11 years 2 days ago
Collaborative systems development in disaster relief: The impact of multi-level governance
Disaster management information systems for international humanitarian relief are developed in contexts involving local, national and inter-governmental organizations together with...
Edgar A. Maldonado, Carleen F. Maitland, Andrea Ho...
books