Sciweavers

1776 search results - page 131 / 356
» Informational cascades in IT adoption
Sort
View
93
Voted
WORM
2004
15 years 3 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
117
Voted
PERVASIVE
2008
Springer
15 years 1 months ago
Context-aware routing in wireless mesh networks
Wireless mesh networks promise to deliver resilient connectivity among network nodes, allowing data to be relayed seamlessly between mobile clients and infrastructure. Routing is ...
Peizhao Hu, Marius Portmann, Ricky Robinson, Jadwi...
SIGIR
2008
ACM
15 years 1 months ago
A comparative evaluation of different link types on enhancing document clustering
With a growing number of works utilizing link information in enhancing document clustering, it becomes necessary to make a comparative evaluation of the impacts of different link ...
Xiaodan Zhang, Xiaohua Hu, Xiaohua Zhou
93
Voted
NAR
2000
128views more  NAR 2000»
15 years 1 months ago
The IMB Jena Image Library of Biological Macromolecules
The IMB Jena Image Library of Biological Macromolecules (http://www.imb-jena.de/IMAGE.html ) is aimed at a better dissemination of information on three-dimensional biopolymer stru...
Jan Reichert, Andreas Jabs, Peter Slickers, Jü...
CHI
2008
ACM
16 years 2 months ago
Usability evaluation considered harmful (some of the time)
Current practice in Human Computer Interaction as encouraged by educational institutes, academic review processes, and institutions with usability groups advocate usability evalua...
Saul Greenberg, William Buxton