Sciweavers

7544 search results - page 1364 / 1509
» Network Forensics Analysis
Sort
View
DPPI
2007
ACM
15 years 8 months ago
Exploring design concepts for sharing experiences through digital photography
In this research, we aim to explore meaningful design directions for future photography applications with a focus on the experiences around sharing. We review a wide-rage of photo-...
Heekyoung Jung, Kay Connelly
EATIS
2007
ACM
15 years 8 months ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler
DASFAA
2009
IEEE
173views Database» more  DASFAA 2009»
15 years 8 months ago
A Uniform Framework for Ad-Hoc Indexes to Answer Reachability Queries on Large Graphs
Graph-structured databases and related problems such as reachability query processing have been increasingly relevant to many applications such as XML databases, biological databas...
Linhong Zhu, Byron Choi, Bingsheng He, Jeffrey Xu ...
GROUP
2007
ACM
15 years 8 months ago
That's what friends are for: facilitating 'who knows what' across group boundaries
We describe the design and evaluation of K-net, a social matching system to help people learn 'who knows what' in an organization by matching people with skills with tho...
N. Sadat Shami, Y. Connie Yuan, Dan Cosley, Ling X...
EUROMICRO
2009
IEEE
15 years 8 months ago
Synthetic Metrics for Evaluating Runtime Quality of Software Architectures with Complex Tradeoffs
Runtime quality of software, such as availability and throughput, depends on architectural factors and execution environment characteristics (e.g. CPU speed, network latency). Alth...
Anakreon Mentis, Panagiotis Katsaros, Lefteris Ang...
« Prev « First page 1364 / 1509 Last » Next »