Sciweavers

2002 search results - page 236 / 401
» Designing Organizations: Towards a Model
Sort
View
ICAIL
2007
ACM
14 years 1 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
IUI
2006
ACM
14 years 3 months ago
Activity-oriented context-aware adaptation assisting mobile geo-spatial activities
Human geospatial activities often involves the use of geographic information in mobile environment where the context of technology use is dynamic, complex, and unstable, creating ...
Guoray Cai, Yinkun Xue
CHI
2011
ACM
13 years 22 days ago
Competing online viewpoints and models of chronic illness
People with chronic health problems use online resources to understand and manage their condition, but many such resources can present competing and confusing viewpoints. We surve...
Jennifer Mankoff, Kateryna Kuksenok, Sara B. Kiesl...
ACMSE
2004
ACM
14 years 2 months ago
Performance evaluation of cache replacement policies for the SPEC CPU2000 benchmark suite
Replacement policy, one of the key factors determining the effectiveness of a cache, becomes even more important with latest technological trends toward highly associative caches....
Hussein Al-Zoubi, Aleksandar Milenkovic, Milena Mi...
CORR
2006
Springer
118views Education» more  CORR 2006»
13 years 9 months ago
Integration and mining of malaria molecular, functional and pharmacological data: how far are we from a chemogenomic knowledge s
The organization and mining of malaria genomic and post-genomic data is important to significantly increase the knowledge of the biology of its causative agents, and is motivated,...
L.-M. Birkholtz, Olivier Bastien, G. Wells, D. Gra...