Sciweavers

7628 search results - page 1356 / 1526
» Spatial P systems
Sort
View
127
Voted
ACSAC
2003
IEEE
15 years 10 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
144
Voted
BIBE
2003
IEEE
15 years 10 months ago
Requirements of Phylogenetic Databases
We examine the organizational impact on phylogenetic databases of the increasing sophistication in the need and use of phylogenetic data. A primary issue is the use of the unnorma...
Luay Nakhleh, Daniel P. Miranker, François ...
131
Voted
DSN
2003
IEEE
15 years 10 months ago
Compiler-Directed Program-Fault Coverage for Highly Available Java Internet Services
Abstract: We present a new approach that uses compilerdirected fault-injection for coverage testing of recovery code in Internet services to evaluate their robustness to operating ...
Chen Fu, Richard P. Martin, Kiran Nagaraja, Thu D....
HICSS
2003
IEEE
93views Biometrics» more  HICSS 2003»
15 years 10 months ago
IT Businesses and Franchising: A Research Proposal
Franchising has been popular as a growth strategy for small businesses; it is even more so in today’s global and information-based economy. In early 2001, Entrepreneur magazineâ...
Ye-Sho Chen, Chitu Okoli, P. Pete Chong
144
Voted
HICSS
2003
IEEE
146views Biometrics» more  HICSS 2003»
15 years 10 months ago
A Performance Environment Perspective of Knowledge Management
Knowledge management is a topic that has gained increasing attention since the mid-1990s. A knowledge management strategy involves consciously helping people share and put knowled...
Anne P. Massey, Mitzi M. Montoya-Weiss
« Prev « First page 1356 / 1526 Last » Next »