Sciweavers

749 search results - page 97 / 150
» The ethical nature of critical research in information syste...
Sort
View
CCS
2007
ACM
15 years 6 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
94
Voted
EJIS
2007
140views more  EJIS 2007»
14 years 12 months ago
External Web content and its influence on organizational performance
Research into the Internet has experienced a tremendous growth within the field of information systems. In this sense, the recent literature focuses on more complex research topic...
Ángel Meroño-Cerdan, Pedro Soto-Acos...
CN
2010
120views more  CN 2010»
14 years 12 months ago
A survey on bio-inspired networking
The developments in the communication and networking technologies have yielded many existing and envisioned information network architectures such as cognitive radio networks, sen...
Falko Dressler, Özgür B. Akan
JCDL
2009
ACM
130views Education» more  JCDL 2009»
15 years 6 months ago
Whetting the appetite of scientists: producing summaries tailored to the citation context
The amount of scientific material available electronically is forever increasing. This makes reading the published literature, whether to stay up-to-date on a topic or to get up ...
Stephen Wan, Cécile Paris, Robert Dale
IS
2011
14 years 6 months ago
Optimized query routing trees for wireless sensor networks
In order to process continuous queries over Wireless Sensor Networks (WSNs), sensors are typically organized in a Query Routing Tree (denoted as T) that provides each sensor with ...
Panayiotis Andreou, Demetrios Zeinalipour-Yazti, A...