Sciweavers

1173 search results - page 22 / 235
» Identifying Successful Telecommuters
Sort
View
HICSS
2011
IEEE
210views Biometrics» more  HICSS 2011»
14 years 1 months ago
Knowledge and Information Sharing in Transnational Knowledge Networks: A Contextual Perspective
As government agencies increasingly collaborate with international counterparts on critical global issues, transnational knowledge and information sharing grow in importance. This...
Sharon S. Dawes, Mohammed A. Gharawi, G. Brian Bur...
90
Voted
CAV
2011
Springer
217views Hardware» more  CAV 2011»
14 years 1 months ago
From Cardiac Cells to Genetic Regulatory Networks
Abstract. A fundamental question in the treatment of cardiac disorders, such as tachycardia and fibrillation, is under what circumstances does such a disorder arise? To answer to ...
Radu Grosu, Grégory Batt, Flavio H. Fenton,...
SAC
2011
ACM
14 years 15 days ago
Reliable protection against session fixation attacks
The term ‘Session Fixation vulnerability’ subsumes issues in Web applications that under certain circumstances enable the adversary to perform a Session Hijacking attack throu...
Martin Johns, Bastian Braun, Michael Schrank, Joac...
CAI
2010
Springer
14 years 7 months ago
Achieving Cost-Effective Software Reliability Through Self-Healing
Heterogeneity, mobility, complexity and new application domains raise new software reliability issues that cannot be met cost-effectively only with classic software engineering ap...
Alessandra Gorla, Mauro Pezzè, Jochen Wuttk...
JAISE
2010
141views Algorithms» more  JAISE 2010»
14 years 4 months ago
Emulation framework for the design and development of active RFID tag systems
The design and development of active RFID tag systems requires several iterations, and thorough testing in order to ensure that the prototype systems behave as intended. Facilitati...
Razvan Beuran, Junya Nakata, Tetsuya Kawakami, Tak...