Sciweavers

4711 search results - page 854 / 943
» Information Systems Engineering: What Is It
Sort
View
HICSS
2003
IEEE
182views Biometrics» more  HICSS 2003»
14 years 1 months ago
Business Intelligence Explorer: A Knowledge Map Framework for Discovering Business Intelligence on the Web
Nowadays, information overload hinders the discovery of business intelligence on the World Wide Web. Existing business intelligence tools suffer from a lack of analysis and visual...
Wingyan Chung, Hsinchun Chen, Jay F. Nunamaker
CCS
2008
ACM
13 years 9 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
EJC
2010
13 years 2 months ago
Modelling a Query Space Using Associations
We all use our associative memory constantly. Words and concepts form paths that we can follow to find new related concepts; for example, when we think about a car we may associate...
Mika Timonen, Paula Silvonen, Melissa Kasari
CHI
2007
ACM
14 years 8 months ago
Tracking the interaction of users with ajax applications for usability testing
In this paper, we introduce an implementation for detailed monitoring of user actions on web pages. It addresses the problem that the log data recorded by standard web servers is ...
Richard Atterer, Albrecht Schmidt
JSSPP
2004
Springer
14 years 1 months ago
Performance Implications of Failures in Large-Scale Cluster Scheduling
As we continue to evolve into large-scale parallel systems, many of them employing hundreds of computing engines to take on mission-critical roles, it is crucial to design those s...
Yanyong Zhang, Mark S. Squillante, Anand Sivasubra...