Sciweavers

3082 search results - page 155 / 617
» its 2004
Sort
View
ECIS
2001
15 years 2 months ago
Back to the Future: From Knowledge Management to Data Management
This paper argues for a return to fundamentals as we enter the new millennium. It argues that the field of Information Systems should no longer be distracted from its natural locu...
Robert D. Galliers, Sue Newell
117
Voted
IJIT
2004
15 years 2 months ago
An HCI Template for Distributed Applications
Both software applications and their development environment are becoming more and more distributed. This trend impacts not only the way software computes, but also how it looks. T...
Xizhi Li
97
Voted
IJIT
2004
15 years 2 months ago
Formal Verification of a Multicast Protocol In Mobile Networks
As computer network technology becomes increasingly complex, it becomes necessary to place greater requirements on the validity of developing standards and the resulting technology...
Mohammad Reza Matash Borujerdi, S. M. Mirzababaei
88
Voted
IMAGING
2004
15 years 2 months ago
Modeling Dot Gain and Inks Interaction
Multispectral printer characterization requires an effective model to map printer input digital counts into reflectance spectra and vice versa. This paper presents a novel strateg...
Silvia Zuffi, Raimondo Schettini
ISICT
2004
15 years 2 months ago
Preventing type flaw attacks on security protocols with a simplified tagging scheme
A type flaw attack on a security protocol is an attack where a field in a message that was originally intended to have one type is subsequently interpreted as having another type. ...
Yafen Li, Wuu Yang, Ching-Wei Huang