Sciweavers

7544 search results - page 1374 / 1509
» Network Forensics Analysis
Sort
View
COOP
2004
15 years 5 months ago
Model Checking Groupware Protocols
Abstract. The enormous improvements in the efficiency of model-checking techniques in recent years facilitates their application to ever more complex systems of concurrent and dist...
Maurice H. ter Beek, Mieke Massink, Diego Latella,...
ESANN
2004
15 years 5 months ago
Data Mining Techniques on the Evaluation of Wireless Churn
This work focuses on one of the most critical issues to plague the wireless telecommunications industry today: the loss of a valuable subscriber to a competitor, also defined as ch...
Jorge Ferreira, Marley B. R. Vellasco, Marco Aur&e...
IADIS
2004
15 years 5 months ago
Dimensions of Facilitators for Non-Business E-Commerce Adoption
Non-business EC is a relatively new research niche in the general e-commerce stream. It denotes the use of e-commerce by non-business institutions such as academic institutions (a...
Nelson Oly Ndubisi, M. A. Masmurniwati
APVIS
2001
15 years 5 months ago
Visual Mapping of Articulable Tacit Knowledge
Tacit knowledge has long been recognised, however its research has focused largely on who is more likely to have this store of knowledge, rather than taking this one step further ...
Peter Busch, Debbie Richards, Christopher N. G. Da...
BDA
2003
15 years 5 months ago
Memory Requirements for Query Execution in Highly Constrained Devices
Pervasive computing introduces data management requirements that must be tackled in a growingvariety of lightweight computing devices. Personal folders on chip, networks of sensor...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
« Prev « First page 1374 / 1509 Last » Next »