Sciweavers

1776 search results - page 179 / 356
» Informational cascades in IT adoption
Sort
View
EL
2008
166views more  EL 2008»
15 years 2 months ago
The digital library as an enterprise: the Zachman approach
Purpose: Examines the needs of digital library stakeholders and how a collaborative digital library might be designed to meet these needs. The collaborative digital library has be...
Abdullah Abrizah, A. N. Zainab
CORR
2006
Springer
81views Education» more  CORR 2006»
15 years 2 months ago
The emergence of knowledge exchange: an agent-based model of a software market
Abstract--We investigate knowledge exchange among commercial organizations, the rationale behind it, and its effects on the market. Knowledge exchange is known to be beneficial for...
Maria Chli, Philippe De Wilde
JIPS
2006
110views more  JIPS 2006»
15 years 1 months ago
Monitoring Systems for Embedded Equipment in Ubiquitous Environments
: Accurate and efficient monitoring of dynamically changing environments is one of the most important requirements for ubiquitous network environments. Ubiquitous computing provide...
Ji-Hye Bae, Hee-Kuk Kang, Yoon-Young Park, Jung-Ho...
TKDE
2002
67views more  TKDE 2002»
15 years 1 months ago
Recovery from Malicious Transactions
Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving part...
Paul Ammann, Sushil Jajodia, Peng Liu
MIDDLEWARE
2010
Springer
15 years 11 days ago
dFault: Fault Localization in Large-Scale Peer-to-Peer Systems
Distributed hash tables (DHTs) have been adopted as a building block for large-scale distributed systems. The upshot of this success is that their robust operation is even more imp...
Pawan Prakash, Ramana Rao Kompella, Venugopalan Ra...