Sciweavers

9640 search results - page 1692 / 1928
» Information Systems Development as an Activity
Sort
View
ACMSE
2006
ACM
15 years 10 months ago
Using an end-to-end demonstration in an undergraduate grid computing course
In this paper, we describe a demonstration called an “End-to-End” demonstration developed for the 2005 offering of our grid computing course that was taught across the State o...
Mark A. Holliday, Barry Wilkinson, James Ruff
ACSAC
2005
IEEE
15 years 10 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
CODES
2005
IEEE
15 years 10 months ago
Satisfying real-time constraints with custom instructions
Instruction-set extensible processors allow an existing processor core to be extended with application-specific custom instructions. In this paper, we explore a novel application...
Pan Yu, Tulika Mitra
HICSS
2005
IEEE
83views Biometrics» more  HICSS 2005»
15 years 10 months ago
Predicting the Usage of P2P Sharing Software: The Role of Trust and Perceived Risk
Peer-to-Peer, or P2P sharing has gone through fast growth in recent years and drawn the interests of Information Systems (IS) researchers. However, there is a lack of empirical st...
Heng Xu, Hao Wang, Hock-Hai Teo
ISDA
2005
IEEE
15 years 10 months ago
Smart Archive: a Component-based Data Mining Application Framework
Implementation of data mining applications is a challenging and complicated task, and the applications are often built from scratch. In this paper, a component-based application f...
Perttu Laurinen, Lauri Tuovinen, Juha Röning
« Prev « First page 1692 / 1928 Last » Next »