Sciweavers

562 search results - page 80 / 113
» Assessing the value of IS journals
Sort
View
WETICE
2006
IEEE
15 years 3 months ago
Security Verification Techniques Applied to PatchLink COTS Software
Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security ...
David P. Gilliam, John D. Powell, Matt Bishop, Chr...
NPAR
2006
ACM
15 years 3 months ago
Non-Photorealistic Rendering in Context: An Observational Study
Pen-and-ink line drawing techniques are frequently used to depict form, tone, and texture in artistic, technical, and scientific illustration. In non-photorealistic rendering (NP...
Tobias Isenberg, Petra Neumann, M. Sheelagh T. Car...
ICMB
2005
IEEE
128views Business» more  ICMB 2005»
15 years 3 months ago
Mobile Customer Relationship Management: An Explorative Investigation of the Italian Consumer Market
Mobile Customer Relationship Management (CRM) services seem to have all the characteristics commonly associated to successful mobile services and have accordingly been predicted a...
Giovanni Camponovo, Yves Pigneur, Andrea Rangone, ...
JCDL
2005
ACM
153views Education» more  JCDL 2005»
15 years 3 months ago
Developing the DigiQUAL protocol for digital library evaluation
The distributed, project-oriented nature of digital libraries (DLs) has made them difficult to evaluate in aggregate. By modifying the methods and tools used to evaluate tradition...
Martha Kyrillidou, Sarah Giersch
ICES
2005
Springer
111views Hardware» more  ICES 2005»
15 years 3 months ago
Evolvable Hardware System at Extreme Low Temperatures
This paper describes circuit evolutionary experiments at extreme low temperatures, including the test of all system components at this extreme environment (EE). In addition to hard...
Ricardo Salem Zebulum, Adrian Stoica, Didier Keyme...