Sciweavers

6560 search results - page 1268 / 1312
» The Human Context of Information Systems
Sort
View
SOUPS
2010
ACM
14 years 1 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
CIKM
2008
Springer
13 years 11 months ago
Feasibility of a primarily digital research library
This position paper explores the issues related to the feasibility of having a primarily digital research library support the teaching and research needs of a university. The Asia...
Geneva L. Henry, Lisa M. Spiro
BMCBI
2007
136views more  BMCBI 2007»
13 years 9 months ago
Prediction of tissue-specific cis-regulatory modules using Bayesian networks and regression trees
Background: In vertebrates, a large part of gene transcriptional regulation is operated by cisregulatory modules. These modules are believed to be regulating much of the tissue-sp...
Xiaoyu Chen, Mathieu Blanchette
BMCBI
2004
173views more  BMCBI 2004»
13 years 9 months ago
d-matrix - database exploration, visualization and analysis
Background: Motivated by a biomedical database set up by our group, we aimed to develop a generic database front-end with embedded knowledge discovery and analysis features. A maj...
Dominik Seelow, Raffaello Galli, Siegrun Mebus, Ha...
CSCW
2011
ACM
13 years 4 months ago
Your time zone or mine?: a study of globally time zone-shifted collaboration
We conducted interviews with sixteen members of teams that worked across global time zone differences. Despite time zone differences of about eight hours, collaborators still foun...
John C. Tang, Chen Zhao, Xiang Cao, Kori Inkpen
« Prev « First page 1268 / 1312 Last » Next »