Sciweavers

2826 search results - page 440 / 566
» A resource-based analysis of IT sourcing
Sort
View
112
Voted
MSWIM
2006
ACM
15 years 7 months ago
Routing in intermittent network topologies
The topic of this paper is the algorithmic development of routing techniques for Delay Tolerant Networks (DTNs). Assuming a store and forward type of network transfers, our main o...
Padma Mundur, Sookyoung Lee, Matthew Seligman
PEWASUN
2006
ACM
15 years 7 months ago
Analytical modeling of random waypoint mobility patterns
Mobility, in its various forms, is one of the sources of several technical challenges being addressed in the last years to achieve a more flexible computing and communication inf...
Fábio Delamare, Fernando Luís Dotti,...
SIGSOFT
2006
ACM
15 years 7 months ago
Detecting increases in feature coupling using regression tests
Repeated changes to a software system can introduce small weaknesses such as unplanned dependencies between different parts of the system. While such problems usually go undetecte...
Olivier Giroux, Martin P. Robillard
SOUPS
2006
ACM
15 years 7 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
WIDM
2006
ACM
15 years 7 months ago
An architecture for creating collaborative semantically capable scientific data sharing infrastructures
Increasingly, scientists are seeking to collaborate and share data among themselves. Such sharing is can be readily done by publishing data on the World-Wide Web. Meaningful query...
Anuj R. Jaiswal, C. Lee Giles, Prasenjit Mitra, Ja...