Sciweavers

189 search results - page 27 / 38
» The Illusion of Effective Management Information: A Critical...
Sort
View
SIGUCCS
2000
ACM
15 years 2 months ago
Implementing LIES (Location Independent Email Service)
This paper will provide a useful guide to those schools that have not yet implemented IMAP and are considering doing so. With both the systems and user services perspectives, any ...
Pamela Vogel, John Spadaro
HICSS
2010
IEEE
156views Biometrics» more  HICSS 2010»
15 years 3 months ago
Tacit Knowledge Flows and Institutional Theory: Accelerating Acculturation
Knowledge is key to sustainable competitive advantage, but different kinds of knowledge affect competitive advantage differently. This applies especially to the environment of inc...
Alicemary Aspell Adams, June G. Chin Yi Lee, Mark ...
CCS
2010
ACM
15 years 1 months ago
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures
Cloud computing has emerged as a multi-tenant resource sharing platform, which allows different service providers to deliver software as services in an economical way. However, fo...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
JUCS
2002
116views more  JUCS 2002»
14 years 9 months ago
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
: ATM virtual path (VP) contains bundles of virtual channels (VCs). A VP layer network can be used as a server layer network of VC layer networks and each VC layer network can be a...
Daniel Won-Kyu Hong, Choong Seon Hong, Dong-Sik Yu...
KDD
2008
ACM
115views Data Mining» more  KDD 2008»
15 years 10 months ago
Topical query decomposition
We introduce the problem of query decomposition, where we are given a query and a document retrieval system, and we want to produce a small set of queries whose union of resulting...
Francesco Bonchi, Carlos Castillo, Debora Donato, ...