Sciweavers

3031 search results - page 485 / 607
» SNMS - Shadow Network Management System
Sort
View
139
Voted
WIDM
2006
ACM
15 years 9 months ago
SRI: exploiting semantic information for effective query routing in a PDMS
The huge amount of data available from Internet information sources has focused much attention on the sharing of distributed information through Peer Data Management Systems (PDMS...
Federica Mandreoli, Riccardo Martoglia, Simona Sas...
136
Voted
ATAL
2004
Springer
15 years 9 months ago
Adaptive Information Infrastructures for the e-Society
Abstract. Positioned at the confluence between human/machine and hardware/software integration and backed by a solid proof of concept realized through several scenarios encompassin...
Mihaela Ulieru
115
Voted
SEC
2007
15 years 5 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
PSLS
1995
15 years 7 months ago
Lazy Remote Procedure Call and its Implementation in a Parallel Variant of C
Abstract. Lazy task creation (LTC) is an e cient approach for executing divide and conquer parallel programs that has been used in the implementation of Multilisp's future con...
Marc Feeley
115
Voted
ECIS
2001
15 years 5 months ago
Learning to value the Bardic tradition: Culture, communication and organisational knowledge
Recent work on organisational knowledge suggests that, in addition to cultivating the 'knowledge spiral', organisations need to focus on facilitating forms of 'know...
Mark Thompson 0002, Geoff Walsham