Sciweavers

524 search results - page 39 / 105
» Why phishing works
Sort
View
JOT
2007
170views more  JOT 2007»
13 years 8 months ago
Enough of Processes - Lets do Practices
All modern software development processes try to help project teams conduct their work. While there are some important differences between them, the commonalities are far greater ...
Ivar Jacobson, Pan Wei Ng, Ian Spence
INTERNET
2008
150views more  INTERNET 2008»
13 years 8 months ago
RPC and REST: Dilemma, Disruption, and Displacement
straction and explained how the Representational State Transfer (REST) architectural style is one alternative that can yield a superior approach to building distributed systems. Be...
Steve Vinoski
CHI
2003
ACM
14 years 8 months ago
Providing elegant peripheral awareness
We first present in this paper why peripheral awareness is important in the context of Air Traffic Controller interfaces. Controllers are often working under a high working load, ...
Jonathan J. Cadiz, Mary Czerwinski, D. Scott McCri...
ORGSCI
2008
54views more  ORGSCI 2008»
13 years 8 months ago
On the Problem of Participation in Strategy: A Critical Discursive Perspective
We still know little of why strategy processes often involve participation problems. In this paper, we argue that this crucial issue is linked to fundamental assumptions concernin...
Saku Mantere, Eero Vaara
ICDE
2003
IEEE
183views Database» more  ICDE 2003»
14 years 10 months ago
Skyline with Presorting
There has been interest recently in skyline queries, also called Pareto queries, on relational databases. Relational query languages do not support search for "best" tupl...
Jan Chomicki, Parke Godfrey, Jarek Gryz, Dongming ...