Sciweavers

2847 search results - page 450 / 570
» The Context-Dependent Role Model
Sort
View
HICSS
2006
IEEE
111views Biometrics» more  HICSS 2006»
14 years 3 months ago
Can Government Be a Good eBayer? The Use of Online Auctions in the Sale of Surplus Property
E-commerce, and online auctions in particular, represent important examples of how information and communication technologies have been employed by public organizations to gain be...
Enrico Ferro, Lucy Dadayan
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
14 years 3 months ago
Missing the Forest for the Trees - Object Technology's Second Hiatus
Object technology was first created in 1967, but it had to wait till the mid 80’s for widespread acceptance and adoption. We observe that that was not the only hiatus for the te...
Viswanathan Kodaganallur
ICDE
2006
IEEE
128views Database» more  ICDE 2006»
14 years 3 months ago
Taming Compliance with Sarbanes-Oxley Internal Controls Using Database Technology
The Sarbanes-Oxley Act instituted a series of corporate reforms to improve the accuracy and reliability of financial reporting. Sections 302 and 404 of the Act require SEC-reporti...
Rakesh Agrawal, Christopher M. Johnson, Jerry Kier...
IJCNN
2006
IEEE
14 years 3 months ago
Shaping Realistic Neuronal Morphologies: An Evolutionary Computation Method
— Neuronal morphology plays a crucial role in the information processing capabilities of neurons. Despite the importance of morphology for neural functionality, biological data i...
Ben Torben-Nielsen, Karl Tuyls, Eric O. Postma
IPPS
2006
IEEE
14 years 3 months ago
Real-time task mapping and scheduling for collaborative in-network processing in DVS-enabled wireless sensor networks
With the increasing importance of energy consumption considerations and new requirements of emerging applications, in-network processing of information gains recognition as a viab...
Yuan Tian, J. Boangoat, Eylem Ekici, Füsun &O...