Sciweavers

9588 search results - page 1689 / 1918
» Service Value Networks
Sort
View
CCS
2005
ACM
15 years 9 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
EGOV
2004
Springer
15 years 9 months ago
e-Government and Information Society: The First Regional Law in Italy
The law recently approved by the the Regional Administration of Tuscany (January 2004) regulates the promotion of electronic administration and the development of the Information ...
Isabella D'Elia
ACSC
2003
IEEE
15 years 9 months ago
Communication Performance Issues for Two Cluster Computers
Clusters of commodity machines have become a popular way of building cheap high performance parallel computers. Many of these designs rely on standard Ethernet networks as a syste...
Francis Vaughan, Duncan A. Grove, Paul D. Coddingt...
VRST
1998
ACM
15 years 8 months ago
Multi-resolution model transmission in distributed virtual environments
Distributed virtual environments allow users at di erent geographical locations to share and interact within a common virtual environment via a local network or through the Intern...
Jimmy H. P. Chim, Rynson W. H. Lau, Antonio Si, Ho...
CAISE
1994
Springer
15 years 8 months ago
Information Systems Modernization
Put yourself in the place of a corporate Chief Information Officer or government agency Information Resource manager... The new budget managers are looking for a quick kill. Your ...
Anthony I. Wasserman
« Prev « First page 1689 / 1918 Last » Next »