Sciweavers

2747 search results - page 167 / 550
» Network externalities in software systems
Sort
View
BIS
2009
192views Business» more  BIS 2009»
13 years 11 months ago
Advanced Social Features in a Recommendation System for Process Modeling
Abstract. Social software is known to stimulate the exchange and sharing of information among peers. This paper describes how an existing system that supports process builders in c...
Agnes Koschmider, Minseok Song, Hajo A. Reijers
CAL
2006
13 years 10 months ago
Adopting system call based address translation into user-level communication
User-level communication alleviates the software overhead of the communication subsystem by allowing applications to access the network interface directly. For that purpose, effici...
Moon-Sang Lee, Sang-Kwon Lee, Joonwon Lee, Seung R...
BSN
2009
IEEE
118views Sensor Networks» more  BSN 2009»
14 years 5 months ago
Smart Jacket Design for Neonatal Monitoring with Wearable Sensors
— Critically ill new born babies admitted at the Neonatal Intensive Care Unit (NICU) are extremely tiny and vulnerable to external disturbance. Smart Jacket proposed in this pape...
Sibrecht Bouwstra, Wei Chen, Loe M. G. Feijs, Sida...
SECON
2007
IEEE
14 years 4 months ago
Privacy Preserving Communication in MANETs
Abstract— Mobile ad hoc networks often support sensitive applications. These applications may require that users’ identity, location, and correspondents be kept secret. This is...
Heesook Choi, Patrick Drew McDaniel, Thomas F. La ...
CLEIEJ
1998
134views more  CLEIEJ 1998»
13 years 10 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You