Sciweavers

1544 search results - page 212 / 309
» The Process of Adoption
Sort
View
DSN
2005
IEEE
15 years 9 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
ECBS
2005
IEEE
164views Hardware» more  ECBS 2005»
15 years 9 months ago
The Impact of Agile Methods on Software Project Management
As more and more software projects engage Agile Methods, there are emerging patterns of success and failure. With growing adoption of Agile Methods, project managers increasingly ...
Michael Coram, Shawn A. Bohner
HICSS
2005
IEEE
99views Biometrics» more  HICSS 2005»
15 years 9 months ago
Impacts of Vertical IS Standards: The Case of the US Home Mortgage Industry
Vertical IS standards prescribe data structures and definitions, document formats, and business processes for particular industries, in contrast to horizontal IT standards, which ...
Rolf T. Wigand, Charles W. Steinfield, M. Lynne Ma...
ICMCS
2005
IEEE
124views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Fast inter frame encoding based on modes pre-decision in H.264
The new video coding standard, H.264 allows motion estimation performing on tree-structured block partitioning and multiple reference frames. This feature improves the prediction ...
Dongming Zhang, Yanfei Shen, Shouxun Lin, Yongdong...
146
Voted
IEEESCC
2005
IEEE
15 years 9 months ago
Web Service Discovery Based on Behavior Signatures
Web service discovery is a key problem as the number of services is expected to increase dramatically. Service discovery at the present time is based primarily on keywords, or int...
Zhongnan Shen, Jianwen Su