Sciweavers

7741 search results - page 1442 / 1549
» Security in Active Networks
Sort
View
EJIS
2006
79views more  EJIS 2006»
15 years 4 months ago
A genealogical study of boundary-spanning IS design
This paper presents the design of a business-aligned information system (IS) from an actor-network perspective, viewing non-human intermediaries jointly as inscriptions and bounda...
Susan Gasson
IJIM
2008
124views more  IJIM 2008»
15 years 4 months ago
Personalization and User Profile Management
Personalization and effective user profile management will be critical to meet the individual users' needs and for achieving eInclusion and eAccessibility. This paper outlines...
Françoise Petersen, Giovanni Bartolomeo, Mi...
CN
2007
121views more  CN 2007»
15 years 4 months ago
Symbiotic rate adaptation for time sensitive elastic traffic with interactive transport
—Interactivity in the transport protocol can greatly benefit transport friendly applications generating streaming traffic. Recently we have developed iTCP, which can provide even...
Javed I. Khan, Raid Zaghal
JCIT
2008
117views more  JCIT 2008»
15 years 4 months ago
The New Face Recognition Technique With the use of PCA and LDA
Image recognition using various image classifiers is an active research area. In this paper we will describe a new face recognition method based on PCA (Principal Component Analys...
Seyed Zeinolabedin Moussavi, Saeedreza Ehteram, Al...
JUCS
2008
125views more  JUCS 2008»
15 years 4 months ago
Evaluation of Agent-based Interactive Systems: Proposal of an Electronic Informer Using Petri Nets
: The evaluation of interactive systems has been an active subject of research for many years. Many methods and tools have been proposed but most of them do not take architectural ...
Chi Dung Tran, Houcine Ezzedine, Christophe Kolski
« Prev « First page 1442 / 1549 Last » Next »