Sciweavers

16844 search results - page 3315 / 3369
» How to Design Programs
Sort
View
AVI
2004
15 years 3 months ago
ValueCharts: analyzing linear models expressing preferences and evaluations
In this paper we propose ValueCharts, a set of visualizations and interactive techniques intended to support decision-makers in inspecting linear models of preferences and evaluat...
Giuseppe Carenini, John Loyd
ECIS
2004
15 years 3 months ago
Implementing Information Systems to support knowledge work: an exploration of work motifs
The research presented in this paper is part of a larger study of the organizational impacts of information systems on knowledge work. The phase of the research reported in the pa...
Christopher J. Davis, Ellen M. Hunagel
IADIS
2004
15 years 3 months ago
End to End Defence Against DDoS Atacks
Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks accounted for more losses than Internet financial fraud and viruses combined (CSI/FBI 2003). The I...
Anastasia Gemona, Ishbel Duncan, Colin Allison, Al...
CIDR
2003
164views Algorithms» more  CIDR 2003»
15 years 3 months ago
Capacity Bound-free Web Warehouse
Web cache technologies have been developed as an extension of CPU cache, by modifying LRU (Least Recently Used) algorithms. Actually in web cache systems, we can use disks and ter...
Yahiko Kambayashi, Kai Cheng
CMG
2003
15 years 3 months ago
Men are From Mars, Women Are From Venus, Web Services are From Betelgeuse
Having trouble making robust legacy applications talk to hot new Web applications? Trying to manage business transactions with your partners when everyone is running their proprie...
Denise P. Kalm, Annie W. Shum
« Prev « First page 3315 / 3369 Last » Next »