Sciweavers

471 search results - page 33 / 95
» An information systems auditor's profile
Sort
View
IUI
2000
ACM
14 years 2 hour ago
SUITOR: an attentive information system
Attentive systems pay attention to what users do so that they can attend to what users need. Such systems track user behavior, model user interests, and anticipate user desires an...
Paul P. Maglio, Rob Barrett, Christopher S. Campbe...
ASPDAC
2008
ACM
107views Hardware» more  ASPDAC 2008»
13 years 9 months ago
Enabling run-time memory data transfer optimizations at the system level with automated extraction of embedded software metadata
The information about the run-time behavior of software applications is crucial for enabling system level optimizations for embedded systems. This embedded Software Metadata inform...
Alexandros Bartzas, Miguel Peón Quiró...
CORR
2010
Springer
123views Education» more  CORR 2010»
13 years 5 months ago
Information Delivery System through Bluetooth in Ubiquitous Networks
------------------------------------------------------ABSTRACT-------------------------------------------------------Ubiquitous and pervasive computing (UPC) is a popular paradigm ...
D. Asha Devi, M. Suresh Bab, V. L. Pavani, N. Geet...
BIOCOMP
2009
13 years 8 months ago
GEFERENCE: Reference Database for Construing Personal Genome Expression
- With the lowering cost and the increasing discoveries, genomics research filed has materialized personal genome era. Especially, microarray gene expression platform has already m...
Changwon Keum, Ju Han Kim, Young Soo Song, Kyoung ...
SECURWARE
2008
IEEE
14 years 2 months ago
Analysis of Computer Infection Risk Factors Based on Customer Network Usage
— Epidemiology, the science that studies the cause and propagation of diseases, provides us with the concepts and methods to analyze the potential risk factors to which ADSL cust...
Yannick Carlinet, Ludovic Mé, Hervé ...