Sciweavers

4998 search results - page 884 / 1000
» The case for intentional networking
Sort
View
AUSFORENSICS
2004
13 years 10 months ago
Generalising Event Forensics Across Multiple Domains
In cases involving computer related crime, event oriented evidence such as computer event logs, and telephone call records are coming under increased scrutiny. The amount of techn...
Bradley Schatz, George M. Mohay, Andrew Clark
CSREASAM
2006
13 years 10 months ago
A Framework for the User-Oriented Personal Information Protection
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
Kenichi Takahashi, Kouichi Sakurai
ECIS
2004
13 years 10 months ago
On integration of digital rights management processes preceding content publishing
The methods and technologies providing advantages in controlling and managing intellectual property rights are currently associated under the term Digital Rights Management (DRM)....
Eetu Luoma, Jarmo Järvi
ECIS
2004
13 years 10 months ago
Towards a Process Model of Media Usage in Global Virtual Teams
In the networked world of today, global virtual teams (GVT) are becoming a common form of work structure. The geographic dispersion in GVT has led to members' high reliance o...
Juliana Sutanto, Chee Wei Phang, Atreyi Kankanhall...
ERSA
2006
111views Hardware» more  ERSA 2006»
13 years 10 months ago
Promises and Pitfalls of Reconfigurable Supercomputing
Reconfigurable supercomputing (RSC) combines programmable logic chips with high performance microprocessors, all communicating over a high bandwidth, low latency interconnection n...
Maya Gokhale, Christopher Rickett, Justin L. Tripp...