Sciweavers

1944 search results - page 267 / 389
» Understanding and evaluating creativity
Sort
View
115
Voted
ACSAC
2003
IEEE
15 years 8 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
HICSS
2003
IEEE
105views Biometrics» more  HICSS 2003»
15 years 8 months ago
Does the Extended Technology Acceptance Model Apply to Physicians
In previous studies, the technology acceptance model (TAM) [1] has been widely used by information technology researchers to gain a better understanding of information technology ...
William G. Chismar, Sonja Wiley-Patton
120
Voted
HICSS
2003
IEEE
152views Biometrics» more  HICSS 2003»
15 years 8 months ago
Advanced Technology and Knowledge Transfer
This paper reports on a specific food and agribusiness industry project, employing new technological capabilities to better transfer expert knowledge. Knowledge transfer and techn...
Geetanjali Tandon, Steven T. Sonka
128
Voted
HOTOS
2003
IEEE
15 years 8 months ago
Magpie: Online Modelling and Performance-aware Systems
Understanding the performance of distributed systems requires correlation of thousands of interactions between numerous components — a task best left to a computer. Today’s sy...
Paul Barham, Rebecca Isaacs, Richard Mortier, Dush...
125
Voted
ICDCS
2003
IEEE
15 years 8 months ago
Decision-Support Workload Characteristics on a Clustered Database Server from the OS Perspective
A range of database services are being offered on clusters of workstations today to meet the demanding needs of applications with voluminous datasets, high computational and I/O r...
Yanyong Zhang, Jianyong Zhang, Anand Sivasubramani...