Sciweavers

9640 search results - page 1692 / 1928
» Information Systems Development as an Activity
Sort
View
ACMSE
2006
ACM
14 years 2 months ago
Using an end-to-end demonstration in an undergraduate grid computing course
In this paper, we describe a demonstration called an “End-to-End” demonstration developed for the 2005 offering of our grid computing course that was taught across the State o...
Mark A. Holliday, Barry Wilkinson, James Ruff
ACSAC
2005
IEEE
14 years 2 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
CODES
2005
IEEE
14 years 2 months ago
Satisfying real-time constraints with custom instructions
Instruction-set extensible processors allow an existing processor core to be extended with application-specific custom instructions. In this paper, we explore a novel application...
Pan Yu, Tulika Mitra
HICSS
2005
IEEE
83views Biometrics» more  HICSS 2005»
14 years 2 months ago
Predicting the Usage of P2P Sharing Software: The Role of Trust and Perceived Risk
Peer-to-Peer, or P2P sharing has gone through fast growth in recent years and drawn the interests of Information Systems (IS) researchers. However, there is a lack of empirical st...
Heng Xu, Hao Wang, Hock-Hai Teo
ISDA
2005
IEEE
14 years 2 months ago
Smart Archive: a Component-based Data Mining Application Framework
Implementation of data mining applications is a challenging and complicated task, and the applications are often built from scratch. In this paper, a component-based application f...
Perttu Laurinen, Lauri Tuovinen, Juha Röning
« Prev « First page 1692 / 1928 Last » Next »