Sciweavers

7059 search results - page 1322 / 1412
» Bayesian network management
Sort
View
EG
2010
119views more  EG 2010»
13 years 6 months ago
Internal factors affecting the adoption and use of government websites
: The purpose of this paper is to identify internal factors within government that affect the adoption and use of government websites. A conceptual framework, based on a literature...
Brian Detlor, Maureen E. Hupfer, Umar Ruhi
IFIP
2010
Springer
13 years 6 months ago
Drivers of B2B Software Purchase Decisions
. Organizations are increasingly turning to large, enterprise-wide software systems as potential solutions to managing complex business-to-business (B2B) relationships. These syste...
Claudia Loebbecke, Thomas Weiss, Philip Powell, Ch...
IJHPCA
2010
111views more  IJHPCA 2010»
13 years 6 months ago
Understanding Application Performance via Micro-benchmarks on Three Large Supercomputers: Intrepid, Ranger and Jaguar
Emergence of new parallel architectures presents new challenges for application developers. Supercomputers vary in processor speed, network topology, interconnect communication ch...
Abhinav Bhatele, Lukasz Wesolowski, Eric J. Bohm, ...
IJWMC
2010
103views more  IJWMC 2010»
13 years 6 months ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
ISCI
2010
146views more  ISCI 2010»
13 years 6 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
« Prev « First page 1322 / 1412 Last » Next »