Sciweavers

4262 search results - page 803 / 853
» Internet and Intranet Computing
Sort
View
217
Voted
EXACT
2009
15 years 1 months ago
Explanations and Arguments Based on Practical Reasoning
In this paper a representative example is chosen that is meant be fairly simple for illustrating the point that in a very common kind of instance, argument and explanation are mixe...
Douglas Walton
134
Voted
GI
2009
Springer
15 years 1 months ago
Component Governance as a Key Factor for IT Business Alignment of Telecommunications Companies
Abstract: Modern telecommunications companies currently undergo remarkable structural changes to be successful in the Next-Generation markets for communications and content product...
Sebastian Reinisch, Uwe Beyer, Robert Mertens
147
Voted
TITB
2010
128views Education» more  TITB 2010»
14 years 10 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...
136
Voted
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 7 months ago
Power management of online data-intensive services
Much of the success of the Internet services model can be attributed to the popularity of a class of workloads that we call Online Data-Intensive (OLDI) services. These workloads ...
David Meisner, Christopher M. Sadler, Luiz Andr&ea...
272
Voted
DIMVA
2011
14 years 7 months ago
Reverse Social Engineering Attacks in Online Social Networks
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the second most visited site on the Internet, and has b...
Danesh Irani, Marco Balduzzi, Davide Balzarotti, E...