Sciweavers

12637 search results - page 162 / 2528
» Security for Extensible Systems
Sort
View
IJMMS
2006
83views more  IJMMS 2006»
15 years 2 months ago
Understanding e-learning continuance intention: An extension of the Technology Acceptance Model
Based on the expectancy disconfirmation theory, this study proposes a decomposed technology acceptance model in the context of an e-learning service. In the proposed model, the pe...
Juan Carlos Roca, Chao-Min Chiu, Francisco Jos&eac...
128
Voted
IMC
2010
ACM
15 years 15 days ago
Scamper: a scalable and extensible packet prober for active measurement of the internet
Large scale active measurement of the Internet requires appropriate software support. The better tools that we have for executing consistent and systematic measurements, the more ...
Matthew J. Luckie
114
Voted
NSDI
2010
15 years 4 months ago
The Architecture and Implementation of an Extensible Web Crawler
Many Web services operate their own Web crawlers to discover data of interest, despite the fact that largescale, timely crawling is complex, operationally intensive, and expensive...
Jonathan M. Hsieh, Steven D. Gribble, Henry M. Lev...
ICTAC
2005
Springer
15 years 8 months ago
A Rewriting Logic Sampler
Rewriting logic is a simple computational logic very well suited as a semantic framework within which many different models of computation, systems and languages can be naturally ...
José Meseguer
116
Voted
CIA
1997
Springer
15 years 6 months ago
Multi-Level Security in Multiagent Systems
Abstract. Whenever agents deal with con dential information, it is important that they comply with a principled security policy. We show how the database concept of multi-level sec...
Gerd Wagner