Sciweavers

861 search results - page 154 / 173
» Research through design as a method for interaction design r...
Sort
View
DSN
2005
IEEE
14 years 2 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
SAICSIT
2010
ACM
13 years 6 months ago
Determining requirements within an indigenous knowledge system of African rural communities
Eliciting and analyzing requirements within knowledge systems, which fundamentally differ so far from technology supported systems represent particular challenges. African rural c...
Heike Winschiers-Theophilus, Nicola J. Bidwell, Sh...
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
14 years 2 months ago
The Illusion of Effective Management Information: A Critical Perspective
The availability of effective management information is essential when coping with today’s complexity and dynamism, both within and around organizations. Information technology ...
Fred A. B. Lohman, Henk G. Sol, Gert-Jan de Vreede
HT
2003
ACM
14 years 2 months ago
Which semantic web?
Through scenarios in the popular press and technical papers in the research literature, the promise of the Semantic Web has raised a number of different expectations. These expect...
Catherine C. Marshall, Frank M. Shipman III
ICC
2007
IEEE
168views Communications» more  ICC 2007»
14 years 18 days ago
Analysis and Optimization of Power Control in Multiuser Cognitive Wireless Networks
In this paper, the problem about power control in multiuser cognitive networks is addressed. The scenario we study is a heterogeneous network, where multiple cognitive (without the...
Peng Cheng, Guanding Yu, Zhaoyang Zhang, Peiliang ...