Sciweavers

6667 search results - page 1291 / 1334
» Applications At Your Service
Sort
View
CCS
2004
ACM
15 years 5 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
ECWEB
2004
Springer
179views ECommerce» more  ECWEB 2004»
15 years 5 months ago
Applying Text Mining on Electronic Messages for Competitive Intelligence
This paper presents how text -mining techniques can be used to analyze an enterprise’s external environment searching for competitors, related products and services, marketing st...
José Palazzo Moreira de Oliveira, Stanley L...
75
Voted
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
15 years 5 months ago
The Role of Organizational Culture in the Management of Clinical e-health Systems
The research here presented focuses upon the informal, social, and cultural side of managerial coordination and control as manifested in clinical e-health systems. Specifically, t...
David Bangert, Robert Doktor
ICDCSW
2003
IEEE
15 years 5 months ago
CATP: A Context-Aware Transportation Protocol for HTTP
— The rendering mechanism used in Web browsers have a significant impact on the user behavior and delay tolerance of retrieval. The head-of-line blocking phenomena prevents the ...
Huamin Chen, Prasant Mohapatra
INFOCOM
2003
IEEE
15 years 5 months ago
S-MIP: A Seamless Handoff Architecture for Mobile IP
—As the number of Mobile IP (MIP) [2] users grow, so will the demand for delay sensitive real-time applications, such as audio streaming, that require seamless handoff, namely, a...
Robert Hsieh, Zhe Guang Zhou, Aruna Seneviratne
« Prev « First page 1291 / 1334 Last » Next »