Sciweavers

1024 search results - page 130 / 205
» Density of Critical Factorizations
Sort
View
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
15 years 10 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
15 years 10 months ago
Which collaboration patterns are most challenging: A global survey of facilitators
Facilitation is a key success factor for effective Group Support Systems (GSS) applications. The development of effective support for facilitation becomes more critical than ever ...
Mariëlle den Hengst, Mark Adkins
ICDE
2007
IEEE
120views Database» more  ICDE 2007»
15 years 10 months ago
Optimizing State-Intensive Non-Blocking Queries Using Run-time Adaptation
Main memory is a critical resource when processing non-blocking queries with state intensive operators that require real-time responses. While partitioned parallel processing can ...
Bin Liu, Mariana Jbantova, Elke A. Rundensteiner
ICPP
2007
IEEE
15 years 10 months ago
Loop-level Speculative Parallelism in Embedded Applications
As multi-core microprocessors are becoming widely adopted, the need to extract thread-level parallelism (TLP) from single-threaded applications in a seamless fashion increases. In...
Md. Mafijul Islam, Alexander Busck, Mikael Engbom,...
INFOCOM
2007
IEEE
15 years 10 months ago
Moore: An Extendable Peer-to-Peer Network Based on Incomplete Kautz Digraph with Constant Degree
— The topological properties of peer-to-peer overlay networks are critical factors that dominate the performance of these systems. Several non-constant and constant degree interc...
Deke Guo, Jie Wu, Honghui Chen, Xueshan Luo