Sciweavers

1544 search results - page 268 / 309
» The Process of Adoption
Sort
View
IADIS
2004
15 years 1 months ago
Mastering the mystery through 'SAIQ' metrics of user experience in telecollaboration business systems
In the preparation of technology transition, the contextual and alternative definitions of the usability heuristics of multifaceted role of the best practice methodology of Teleco...
Venkatesh Mahadevan, Zenon Chaczko, Robin Braun
ACL
2009
14 years 9 months ago
A Novel Word Segmentation Approach for Written Languages with Word Boundary Markers
Most NLP applications work under the assumption that a user input is error-free; thus, word segmentation (WS) for written languages that use word boundary markers (WBMs), such as ...
Han-Cheol Cho, Do-Gil Lee, Jung-Tae Lee, Pontus St...
DISCEX
2003
IEEE
15 years 5 months ago
NetBouncer: Client-legitimacy-based High-performance DDoS Filtering
We describe "NetBouncer", an approach and set of technologies for providing practical and highperformance defenses against distributed denial-ofservice (DDoS) attacks. T...
Roshan K. Thomas, Brian L. Mark, Tommy Johnson, Ja...
SC
2009
ACM
15 years 4 months ago
A framework for core-level modeling and design of reconfigurable computing algorithms
Reconfigurable computing (RC) is rapidly becoming a vital technology for many applications, from high-performance computing to embedded systems. The inherent advantages of custom-...
Gongyu Wang, Greg Stitt, Herman Lam, Alan D. Georg...
BMCBI
2011
14 years 3 months ago
PI: An open-source software package for validation of the SEQUEST result and visualization of mass spectrum
Background: Tandem mass spectrometry (MS/MS) has emerged as the leading method for high- throughput protein identification in proteomics. Recent technological breakthroughs have d...
Yantao Qiao, Hong Zhang, Dongbo Bu, Shiwei Sun