Sciweavers

5863 search results - page 1028 / 1173
» On Model-Checking of P Systems
Sort
View
123
Voted
ACSAC
2003
IEEE
15 years 9 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
133
Voted
BIBE
2003
IEEE
15 years 9 months ago
Requirements of Phylogenetic Databases
We examine the organizational impact on phylogenetic databases of the increasing sophistication in the need and use of phylogenetic data. A primary issue is the use of the unnorma...
Luay Nakhleh, Daniel P. Miranker, François ...
126
Voted
DSN
2003
IEEE
15 years 9 months ago
Compiler-Directed Program-Fault Coverage for Highly Available Java Internet Services
Abstract: We present a new approach that uses compilerdirected fault-injection for coverage testing of recovery code in Internet services to evaluate their robustness to operating ...
Chen Fu, Richard P. Martin, Kiran Nagaraja, Thu D....
HICSS
2003
IEEE
93views Biometrics» more  HICSS 2003»
15 years 9 months ago
IT Businesses and Franchising: A Research Proposal
Franchising has been popular as a growth strategy for small businesses; it is even more so in today’s global and information-based economy. In early 2001, Entrepreneur magazineâ...
Ye-Sho Chen, Chitu Okoli, P. Pete Chong
132
Voted
HICSS
2003
IEEE
146views Biometrics» more  HICSS 2003»
15 years 9 months ago
A Performance Environment Perspective of Knowledge Management
Knowledge management is a topic that has gained increasing attention since the mid-1990s. A knowledge management strategy involves consciously helping people share and put knowled...
Anne P. Massey, Mitzi M. Montoya-Weiss
« Prev « First page 1028 / 1173 Last » Next »