Sciweavers

1422 search results - page 133 / 285
» A Framework for Understanding Botnets
Sort
View
CADE
2006
Springer
16 years 4 months ago
Specifying and Reasoning About Dynamic Access-Control Policies
Access-control policies have grown from simple matrices to non-trivial specifications written in sophisticated languages. The increasing complexity of these policies demands corres...
Daniel J. Dougherty, Kathi Fisler, Shriram Krishna...
HICSS
2010
IEEE
153views Biometrics» more  HICSS 2010»
15 years 10 months ago
Reorganizing Projects through Enterprise System: Emerging Role of Enterprise System in Radical Organizational Change
In this paper we analyze the role of Enterprise System (ES) in shaping a company’s transformation process by conducting an in-depth case study in a large European high-tech comp...
Merja Mattila, Joe Nandhakumar, Petri Hallikainen,...
ENTER
2010
Springer
15 years 10 months ago
An Analysis of Search Engine Use for Travel Planning
Search engines have become a central part of the internet marketing strategy of tourism businesses and, as such, it is essential that destination marketing organizations have a su...
Daniel R. Fesenmaier, Zheng Xiang, Bing Pan, Rob L...
ISBMS
2010
Springer
15 years 10 months ago
Biomechanical Simulation of Human Eye Movement
Understanding the neural control and mechanics of human eye movement has significant implications for treating vision disorders. A computational model incorporating physiological ...
Qi Wei, Shinjiro Sueda, Dinesh K. Pai
117
Voted
PAM
2010
Springer
15 years 10 months ago
Web Timeouts and Their Implications
Abstract. Timeouts play a fundamental role in network protocols, controlling numerous aspects of host behavior at different layers of the protocol stack. Previous work has documen...
Zakaria Al-Qudah, Michael Rabinovich, Mark Allman