Sciweavers

323 search results - page 6 / 65
» Doing it right
Sort
View
ECIS
2003
15 years 1 months ago
Do you know your terms? - A procedure model for terminology management
Due to the extensive development und use of information technology, a lot of companies gained access to vast internal and external information sources. Yet nonetheless, efficiency...
Stefan Kremer, Lutz Kolbe, Walter Brenner
IJON
2007
96views more  IJON 2007»
14 years 11 months ago
How do stimulus-dependent correlations between V1 neurons affect neural coding?
Nearby neurons in the visual cortex often partially synchronize their spiking activity. Despite the widespread observation of this phenomenon, its importance for visual coding and...
Fernando Montani, Adam Kohn, Matthew A. Smith, Sim...
CN
2007
80views more  CN 2007»
14 years 11 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
ACSAC
2002
IEEE
15 years 4 months ago
Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision
Designers are often faced with difficult tradeoffs between easing the user's burden by making security decisions for them and offering features that ensure that users can mak...
Mary Ellen Zurko, Charlie Kaufman, Katherine Spanb...
CHI
2008
ACM
16 years 2 days ago
The disappearing desktop: pim 2008
In an ideal world, we would always have the right information, in the right form, with the right context, right when we needed it. Unfortunately, we do not live in an ideal world....
Jaime Teevan, William Jones