Sciweavers

749 search results - page 81 / 150
» The ethical nature of critical research in information syste...
Sort
View
HICSS
2008
IEEE
185views Biometrics» more  HICSS 2008»
14 years 2 months ago
Organizational Readiness for Business Process Outsourcing: A Model of Determinants and Impact on Outsourcing Success
In innovation adoption literature, the important role of the organizational context as a determinant of information systems (IS) success has long been pointed out. Various factors...
Sebastian F. Martin, Daniel Beimborn, Mihir A. Par...
BMCBI
2005
87views more  BMCBI 2005»
13 years 7 months ago
BioCreAtIvE Task 1A: gene mention finding evaluation
Background: The biological research literature is a major repository of knowledge. As the amount of literature increases, it will get harder to find the information of interest on...
Alexander S. Yeh, Alexander A. Morgan, Marc E. Col...
VEE
2006
ACM
115views Virtualization» more  VEE 2006»
14 years 1 months ago
Live updating operating systems using virtualization
Many critical IT infrastructures require non-disruptive operations. However, the operating systems thereon are far from perfect that patches and upgrades are frequently applied, i...
Haibo Chen, Rong Chen, Fengzhe Zhang, Binyu Zang, ...
ICMCS
2006
IEEE
113views Multimedia» more  ICMCS 2006»
14 years 1 months ago
On Parallelization of a Video Mining System
As digital video data becomes more pervasive, mining information from multimedia data becomes increasingly important. Although researches in multimedia mining area have shown grea...
Wenlong Li, Eric Li, Nan Di, Carole Dulong, Tao Wa...
HICSS
2009
IEEE
120views Biometrics» more  HICSS 2009»
14 years 2 months ago
Trapping Malicious Insiders in the SPDR Web
The insider threat has assumed increasing importance as our dependence on critical cyber information infrastructure has increased. In this paper we describe an approach for thwart...
J. Thomas Haigh, Steven A. Harp, Richard C. O'Brie...