Sciweavers

1733 search results - page 115 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
HCI
2007
15 years 3 months ago
An Experimental Evaluation of Information Visualization Techniques and Decision Style
The importance of individual characteristics has been emphasized in the human computer interaction and information visualization (IV) literature. However, decision style, which is...
Wan Adilah Wan Adnan, Nor Laila Md. Noor, Rasimah ...
WETICE
2003
IEEE
15 years 6 months ago
Software Security Checklist for the Software Life Cycle
A formal approach to security in the software life cycle is essential to protect corporate resources. However, little thought has been given to this aspect of software development...
David P. Gilliam, Thomas L. Wolfe, Joseph S. Sheri...
COMCOM
2007
149views more  COMCOM 2007»
15 years 1 months ago
Cache invalidation strategies for internet-based mobile ad hoc networks
Internet-based mobile ad hoc network (IMANET) combines a mobile ad hoc network (MANET) and the Internet to provide universal information accessibility. Although caching frequently...
Sunho Lim, Wang-Chien Lee, Guohong Cao, Chita R. D...
JAL
2008
97views more  JAL 2008»
15 years 1 months ago
Experimental studies of variable selection strategies based on constraint weights
An important class of heuristics for constraint satisfaction problems works by sampling information during search in order to inform subsequent decisions. One of these strategies, ...
Richard J. Wallace, Diarmuid Grimes
113
Voted
SEMWEB
2004
Springer
15 years 7 months ago
SWS for Financial Overdrawn Alerting
Abstract. In this paper, we present a Notification Agent designed and implemented using Semantic Web Services. The Notification Agent manages alerts when critical financial situati...
José Manuel López Cobo, Silvestre Lo...