Sciweavers

2159 search results - page 377 / 432
» C-K design theory for information systems research
Sort
View
SIGCOMM
2009
ACM
15 years 8 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
MOBIHOC
2008
ACM
16 years 1 months ago
Generic mobility simulation framework (GMSF)
Vehicular ad-hoc networks with inter-vehicular communications are a prospective technology which contributes to safer and more efficient roads and offers information and entertain...
Rainer Baumann, Franck Legendre, Philipp Sommer
EDBT
2009
ACM
218views Database» more  EDBT 2009»
15 years 8 months ago
Data integration flows for business intelligence
Business Intelligence (BI) refers to technologies, tools, and practices for collecting, integrating, analyzing, and presenting large volumes of information to enable better decisi...
Umeshwar Dayal, Malú Castellanos, Alkis Sim...
CCR
2005
129views more  CCR 2005»
15 years 1 months ago
The problem of synthetically generating IP traffic matrices: initial recommendations
There exist a wide variety of network design problems that require a traffic matrix as input in order to carry out performance evaluation. The research community has not had at it...
Antonio Nucci, Ashwin Sridharan, Nina Taft
ACMACE
2008
ACM
15 years 4 months ago
BragFish: exploring physical and social interaction in co-located handheld augmented reality games
In this paper, we present our research on social interaction in colocated handheld augmented reality (AR) games. These games are characterized by shared physical spaces that promo...
Yan Xu, Maribeth Gandy, Sami Deen, Brian Schrank, ...