Sciweavers

2399 search results - page 236 / 480
» Knowledge Management and the Design of Distributed Cognition...
Sort
View
FPLAY
2008
15 years 3 months ago
Lessons from Brain Age on password memorability
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Alain Forget, Sonia Chiasson, Robert Biddle
IJCIM
2007
99views more  IJCIM 2007»
15 years 1 months ago
Fuzzy multi-objective optimization for network design of integrated e-supply chains
Worldwide competition originated the development of Integrated E-Supply Chains (IESC) that are distributed manufacturing systems integrating international logistics and informatio...
Mariagrazia Dotoli, Maria Pia Fanti, Agostino Marc...
115
Voted
CORR
2010
Springer
85views Education» more  CORR 2010»
14 years 9 months ago
Rancangan Infrastruktur E-Bisnis Business Intelligence Pada Perguruan Tinggi
In order to compete with others, high education need complete their infrastructure with Information technology support. High level management as a decision maker needs something t...
Spits Warnars
123
Voted
WOA
2003
15 years 3 months ago
A Programming Environment for Global Activity-based Applications
Abstract— This paper focuses on large-scale distributed systems that can be modeled as workflows of activities sharing resources, knowledge, know-how and services. We propose a ...
Flavio Corradini, Leonardo Mariani, Emanuela Merel...
INFOCOM
2007
IEEE
15 years 8 months ago
Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs
—One key adaptation mechanism often deployed in networking and computing systems is dynamic load balancing. The goal from employing dynamic load balancers is to ensure that the o...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...