Sciweavers

25111 search results - page 4851 / 5023
» Information Systems
Sort
View
IMC
2006
ACM
15 years 11 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan
GI
2003
Springer
15 years 10 months ago
Prozessorientierte Balanced Scorecard als Instrument des IT-Managements
Abstract: Mit Hilfe von speziell auf seine Bedürfnisse zugeschnittene Berichtssysteme kann das IT-Management das interne Prozessmanagement sinnvoll unterstützen. An dem Beispiel ...
Jörg Becker, Ralf Knackstedt, Tobias Rieke
SIGUCCS
1998
ACM
15 years 9 months ago
The ResNet Obstacle Course
There are many ways to train student employees, but hands-on experience is invaluable. To provide our Resident Computer Consultants (RCCs) with the experience they need to solve t...
Kathleen A. Hausmann
163
Voted
WWW
2008
ACM
16 years 6 months ago
Supporting anonymous location queries in mobile environments with privacygrid
This paper presents PrivacyGrid - a framework for supporting anonymous location-based queries in mobile information delivery systems. The PrivacyGrid framework offers three unique...
Bhuvan Bamba, Ling Liu, Péter Pesti, Ting W...
PODS
2008
ACM
152views Database» more  PODS 2008»
16 years 5 months ago
Towards a theory of schema-mapping optimization
A schema mapping is a high-level specification that describes the relationship between two database schemas. As schema mappings constitute the essential building blocks of data ex...
Ronald Fagin, Phokion G. Kolaitis, Alan Nash, Luci...
« Prev « First page 4851 / 5023 Last » Next »