Sciweavers

9640 search results - page 1707 / 1928
» Information Systems Development as an Activity
Sort
View
LISA
2001
13 years 9 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
WOB
2004
103views Bioinformatics» more  WOB 2004»
13 years 9 months ago
An I/O Device Driver for Bioinformatics Tools: the case for BLAST
There are many bioinformatics tools that deal with input/ output (I/O) issues by using filing systems from the most common operating systems, such as Linux or MS Windows. However, ...
Renato Mauro, Sérgio Lifschitz
ICIS
2000
13 years 9 months ago
The politics of IS evaluation: a social shaping perspective
A considerable amount of research has already been conducted in the IT/IS evaluation arena, yet rewards remain elusive. This has been variously explained and in this paper we aim ...
Melanie Wilson, Debra Howcroft
RIAO
2000
13 years 9 months ago
Automatic Question Answering
We have developed a method for answering single answer questions automatically using a collection of documents or the Internet as a source of data for the production of the answer...
James R. Cowie, Yevgeny Ludovik, Hugo Molina-Salga...
AAAI
1996
13 years 9 months ago
An Optimal Contracting Strategy in a Digital Library
Agents can benefit from contracting some of their tasks that cannot be performedby themselves or that can be performed moreefficiently by other agents. Developing an agent's ...
Sunju Park, Edmund H. Durfee
« Prev « First page 1707 / 1928 Last » Next »