Sciweavers

9210 search results - page 1524 / 1842
» Analyzing Real-Time Systems
Sort
View
102
Voted
DASC
2006
IEEE
15 years 7 months ago
Assessing Vulnerabilities in Apache and IIS HTTP Servers
We examine the feasibility of quantitatively characterizing the vulnerabilities in the two major HTTP servers. In particular, we investigate the applicability of quantitative empi...
Sung-Whan Woo, Omar H. Alhazmi, Yashwant K. Malaiy...
90
Voted
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
15 years 7 months ago
Game Theoretical Analysis of Cooperative Sourcing Scenarios
As an emerging trend in outsourcing, cooperative sourcing is the merging of similar processes of several firms when, for example, several banks merge their payments processing and...
Daniel Beimborn, Hermann-Josef Lamberti, Tim Weitz...
87
Voted
HICSS
2006
IEEE
96views Biometrics» more  HICSS 2006»
15 years 7 months ago
When Online Reviews Meet Hyperdifferentiation: A Study of Craft Beer Industry
We analyze how online reviews can be used to evaluate product differentiation strategy based on the theories of hyperdifferentiation and resonance marketing. Hyperdifferentiation ...
Eric K. Clemons, Guodong Gao, Lorin M. Hitt
91
Voted
HICSS
2006
IEEE
117views Biometrics» more  HICSS 2006»
15 years 7 months ago
Stakeholders, Contradictions and Salience: An Empirical Study of a Norwegian G2G Effort
Previous studies indicate that the expected effects of e-Government are slower to realize than initially expected. Several authors argue that e-Government involves particularly co...
Leif Skiftenes Flak, Stig Nordheim
97
Voted
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
15 years 7 months ago
Using Social Network Analysis to Test an IT-Enabled Business Process Reengineering Theory
After more than a decade of research in information technology-enabled business process reengineering (BPR), no clear theory explains the link between information technology (IT) ...
Nik R. Hassan, Tom C. Richards, Jack D. Becker
« Prev « First page 1524 / 1842 Last » Next »