Sciweavers

7422 search results - page 1349 / 1485
» Ethnomethodologically informed ethnography and information s...
Sort
View
IEEEHPCS
2010
15 years 8 days ago
An experimental study of greedy routing algorithms
The “small world” phenomenon, i.e., the fact that the global social network is strongly connected in the sense that every two persons are inter-related through a small chain o...
Stavros Athanassopoulos, Christos Kaklamanis, Ilia...
IJCAT
2010
132views more  IJCAT 2010»
15 years 7 days ago
Using weaving models to automate model-driven web engineering proposals
The impact of Model-Driven Software Development in Web Engineering has given raise to the advent of Model-Driven Web Engineering, a new approach for Web Information Systems develop...
Juan M. Vara, Valeria de Castro, Marcos Didonet De...
IJIPT
2010
147views more  IJIPT 2010»
15 years 7 days ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
116
Voted
IVA
2010
Springer
15 years 6 days ago
Speed Dating with an Affective Virtual Agent - Developing a Testbed for Emotion Models
In earlier studies, user involvement with an embodied software agent and willingness to use that agent were partially determined by the aesthetics of the design and the moral fiber...
Matthijs Pontier, Ghazanfar F. Siddiqui, Johan F. ...
JMS
2010
139views more  JMS 2010»
15 years 6 days ago
Application of Portable CDA for Secure Clinical-document Exchange
Health Level Seven (HL7) organization published the Clinical Document Architecture (CDA) for exchanging documents among heterogeneous systems and improving medical quality based on...
Kuo-Hsuan Huang, Sung-huai Hsieh, Yuan-Jen Chang, ...
« Prev « First page 1349 / 1485 Last » Next »