Sciweavers

1265 search results - page 124 / 253
» Finding the Key to a Synapse
Sort
View
HICSS
2008
IEEE
114views Biometrics» more  HICSS 2008»
14 years 3 months ago
The Factors that Affect the Implementation Success of IS
How to implement an IS (information system) successfully remains a problem. To address this, drawing on information processing theory, this study proposes an integrated model that...
Shih-Wei Chou, Mong-Young He, Pi-Yi Chen
HICSS
2008
IEEE
105views Biometrics» more  HICSS 2008»
14 years 3 months ago
Understanding Knowledge-Intensive, Practice-Oriented Business Processes
In order to create new opportunities for competitive differentiation, organisations are starting to shift their focus from transactional operational Business Processes (BPs) to ot...
Olivera Marjanovic, Ravi Seethamraju
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
14 years 3 months ago
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
Abstract: We adapt the event study methodology from research in financial economics to study the impact of government enforcement and economic opportunities on information security...
Ivan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang
HPCA
2008
IEEE
14 years 3 months ago
Prediction of CPU idle-busy activity pattern
Real-world workloads rarely saturate multi-core processor. CPU C-states can be used to reduce power consumption during processor idle time. The key unsolved problem is: when and h...
Qian Diao, Justin J. Song
ICPR
2008
IEEE
14 years 3 months ago
Grading nuclear pleomorphism on histological micrographs
A mainstay in cancer diagnostics is the classification or grading of cell nuclei based on their appearance. While the analysis of cytological samples has been automated successful...
Eric Cosatto, Matthew Miller, Hans Peter Graf, Joh...