Sciweavers

1625 search results - page 284 / 325
» Intentionality
Sort
View
HICSS
2007
IEEE
151views Biometrics» more  HICSS 2007»
15 years 4 months ago
Strategic and Institutional Perspectives in the Adoption and Early Integration of Radio Frequency Identification (RFID)
Using multiple lenses of strategic choice theories (diffusion of innovation, organizational innovativeness) and institutional theory as the basis and reflecting data from semi-str...
Aditya Sharma, Alex Citurs, Benn R. Konsynski
ICC
2007
IEEE
105views Communications» more  ICC 2007»
15 years 4 months ago
An Experimental Study on Cheating and Anti-Cheating in Gossip-Based Protocol
Abstract—The Internet has witnessed a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node independen...
Yun Tang, Nan Zhang, Yuanchun Shi, Shiqiang Yang, ...
IRI
2007
IEEE
15 years 4 months ago
BESearch: A Supervised Learning Approach to Search for Molecular Event Participants
Biomedical researchers rely on keyword-based search engines to retrieve superficially relevant documents, from which they must filter out irrelevant information manually. Hence, t...
Richard Tzong-Han Tsai, Hong-Jie Dai, Hsi-Chuan Hu...
IROS
2007
IEEE
132views Robotics» more  IROS 2007»
15 years 4 months ago
In-vivo pan/tilt endoscope with integrated light source
— Endoscopic imaging is still dominated by the paradigm of pushing long sticks into small openings. This approach has a number of limitations for minimal access surgery, such as ...
Tie Hu, Peter K. Allen, Dennis L. Fowler
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
15 years 4 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...