Sciweavers

412 search results - page 67 / 83
» An Empirical Approach to Modeling Uncertainty in Intrusion A...
Sort
View
GD
2008
Springer
13 years 8 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
BMCBI
2008
115views more  BMCBI 2008»
13 years 7 months ago
Systems biology driven software design for the research enterprise
Background: In systems biology, and many other areas of research, there is a need for the interoperability of tools and data sources that were not originally designed to be integr...
John Boyle, Christopher C. Cavnor, Sarah A. Killco...
CCGRID
2010
IEEE
13 years 8 months ago
The Effects of Untruthful Bids on User Utilities and Stability in Computing Markets
Markets of computing resources typically consist of a cluster (or a multi-cluster) and jobs that arrive over time and request computing resources in exchange for payment. In this p...
Sergei Shudler, Lior Amar, Amnon Barak, Ahuva Mu'a...
JKM
2007
88views more  JKM 2007»
13 years 7 months ago
The concept of knowledge in KM: a dimensional model
Purpose: To sharpen the concepts of tacit, implicit and explicit knowledge by linking them to findings from cognitive psychology and memory science and thus finding a possibility ...
Bertolt Meyer, Kozo Sugiyama
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
14 years 27 days ago
No More Shadow Boxing with Online Music Piracy: Strategic Business Models to Enhance Revenues
Novel online file sharing technologies have created new market dynamics and posed a great challenge to the music industry to try and retain customers. Consumers have created anony...
Sudip Bhattacharjee, Ram D. Gopal, Kaveepan Lertwa...