Sciweavers

18697 search results - page 3726 / 3740
» Systemic Security Management
Sort
View
137
Voted
CCR
2004
157views more  CCR 2004»
15 years 3 months ago
Designing BGP-based outbound traffic engineering techniques for stub ASes
Today, most multi-connected autonomous systems (AS) need to control the flow of their interdomain traffic for both performance and economical reasons. This is usually done by manu...
Steve Uhlig, Olivier Bonaventure
CSCW
2004
ACM
15 years 3 months ago
Domestic Routines and Design for the Home
The domestic environment is predicted by market analysts to be the major growth area in computing over the next decade, yet it is a poorly understood domain at the current time of...
Andy Crabtree, Tom Rodden
142
Voted
CSCW
2002
ACM
15 years 3 months ago
NetWORKers and their Activity in Intensional Networks
Through ethnographic research, we document the rise of personal social networks in the workplace, which we call intensional networks. Paradoxically, we find that the most fundament...
Bonnie A. Nardi, Steve Whittaker, Heinrich Schwarz
158
Voted
DKE
2002
113views more  DKE 2002»
15 years 3 months ago
A general strategy for decomposing topological invariants of spatial databases and an application
Topological invariants of spatial databases (i.e., finite structures that capture the topological properties of the database) are receiving increasing attention since they can act...
Serafino Cicerone, Daniele Frigioni, Paolino Di Fe...
156
Voted
GIS
2002
ACM
15 years 3 months ago
Opening the black box: interactive hierarchical clustering for multivariate spatial patterns
Clustering is one of the most important tasks for geographic knowledge discovery. However, existing clustering methods have two severe drawbacks for this purpose. First, spatial c...
Diansheng Guo, Donna Peuquet, Mark Gahegan
« Prev « First page 3726 / 3740 Last » Next »