Sciweavers

356 search results - page 39 / 72
» The human infrastructure of cyberinfrastructure
Sort
View
WSC
2001
13 years 9 months ago
Call center scheduling technology evaluation using simulation
Telemarketers, direct marketing agencies, collection agencies and others whose primary means of customer contact is via the telephone invest considerable sums of money to make the...
Sandeep Gulati, Scott A. Malcolm
WSPI
2004
13 years 9 months ago
Grounding Knowledge of Engineering Applications in Systematic Terms
In the main research of internet-computing enabled knowledge management, we use some of the most advanced research scenarios, arguing that we critically need a system approach to q...
Ying Liu 0002, Jin Yu
SAC
2006
ACM
13 years 8 months ago
Editorial message: special track on ubiquitous computing
Ubiquitous computing places humans in the center of environments saturated with computing and wireless communications capabilities, yet gracefully integrated, so that technology r...
Achilles Kameas, George Roussos
AC
2004
Springer
13 years 8 months ago
Cognitive Hacking
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
George Cybenko, Annarita Giani, Paul Thompson
JSW
2007
116views more  JSW 2007»
13 years 8 months ago
Security Patterns for Voice over IP Networks
—Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditi...
Eduardo B. Fernández, Juan C. Pelaez, Mar&i...