Sciweavers

12637 search results - page 162 / 2528
» Security for Extensible Systems
Sort
View
IJMMS
2006
83views more  IJMMS 2006»
13 years 9 months ago
Understanding e-learning continuance intention: An extension of the Technology Acceptance Model
Based on the expectancy disconfirmation theory, this study proposes a decomposed technology acceptance model in the context of an e-learning service. In the proposed model, the pe...
Juan Carlos Roca, Chao-Min Chiu, Francisco Jos&eac...
IMC
2010
ACM
13 years 7 months ago
Scamper: a scalable and extensible packet prober for active measurement of the internet
Large scale active measurement of the Internet requires appropriate software support. The better tools that we have for executing consistent and systematic measurements, the more ...
Matthew J. Luckie
NSDI
2010
13 years 10 months ago
The Architecture and Implementation of an Extensible Web Crawler
Many Web services operate their own Web crawlers to discover data of interest, despite the fact that largescale, timely crawling is complex, operationally intensive, and expensive...
Jonathan M. Hsieh, Steven D. Gribble, Henry M. Lev...
ICTAC
2005
Springer
14 years 2 months ago
A Rewriting Logic Sampler
Rewriting logic is a simple computational logic very well suited as a semantic framework within which many different models of computation, systems and languages can be naturally ...
José Meseguer
CIA
1997
Springer
14 years 23 days ago
Multi-Level Security in Multiagent Systems
Abstract. Whenever agents deal with con dential information, it is important that they comply with a principled security policy. We show how the database concept of multi-level sec...
Gerd Wagner