Sciweavers

1092 search results - page 217 / 219
» Personalized Presentation in Web-Based Information Systems
Sort
View
76
Voted
CCS
2004
ACM
15 years 2 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
GI
2004
Springer
15 years 2 months ago
Quality Criteria for Competency Assignments: Examples from a Project Management Case Study
: We present several quality criteria for skills management initiatives based on the competence-performance approach [Kor97]. The criteria help to measure reliability and validity ...
Tobias Ley, Dietrich Albert
IMC
2003
ACM
15 years 2 months ago
On inferring and characterizing internet routing policies
Border Gateway Protocol allows Autonomous Systems (ASs) to apply diverse routing policies for selecting routes and for propagating reachability information to other ASs. Although ...
Feng Wang, Lixin Gao
SENSYS
2003
ACM
15 years 2 months ago
Model-based compression in wireless ad hoc networks
We present a technique for compression of shortest paths routing tables for wireless ad hoc networks. The main characteristic of such networks is that geographic location of nodes...
Milenko Drinic, Darko Kirovski, Miodrag Potkonjak
HICSS
2002
IEEE
106views Biometrics» more  HICSS 2002»
15 years 2 months ago
Satisfaction with Internet-Based Services
: This research develops, operationalizes, and empirically tests a model for explaining/predicting the satisfaction of customers with Internet-based services in the context of an o...
Mohamed Khalifa, Vanessa Liu