Sciweavers

2159 search results - page 380 / 432
» C-K design theory for information systems research
Sort
View
IDTRUST
2010
ACM
15 years 6 months ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch
MM
2010
ACM
135views Multimedia» more  MM 2010»
15 years 2 months ago
Trajectory-based visualization of web video topics
While there have been research efforts in organizing largescale web videos into topics, efficient browsing of web video topics remains a challenging problem not yet addressed. The...
Juan Cao, Chong-Wah Ngo, Yongdong Zhang, Dongming ...
UIST
2010
ACM
14 years 11 months ago
Eden: supporting home network management through interactive visual tools
As networking moves into the home, home users are increasingly being faced with complex network management chores. Previous research, however, has demonstrated the difficulty many...
Jeonghwa Yang, W. Keith Edwards, David Haslem
ISI
2008
Springer
15 years 1 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
WWW
2006
ACM
16 years 2 months ago
Interactive wrapper generation with minimal user effort
While much of the data on the web is unstructured in nature, there is also a significant amount of embedded structured data, such as product information on e-commerce sites or sto...
Utku Irmak, Torsten Suel