Sciweavers

37 search results - page 7 / 8
» A decision making procedure for collaborative planning
Sort
View
AISM
2004
14 years 5 days ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
SOSP
2003
ACM
14 years 7 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
ICRA
2008
IEEE
160views Robotics» more  ICRA 2008»
14 years 5 months ago
A constrained optimization approach to virtual fixtures for multi-handed tasks
— In this work, we have extended the concept of constrained motion control of robots to surgical tasks that require multiple robots. We present virtual fixtures to guide the mot...
Ankur Kapoor, Russell H. Taylor
HICSS
2003
IEEE
100views Biometrics» more  HICSS 2003»
14 years 4 months ago
Increase of Potential Intellectual Bandwidth in a Scientific Community through Implementation of an End-User Information System
Qureshi, et al. (2002) [1] presented a case study where they used a framework, the Intellectual Bandwidth Model to measure an organization’s ability to create value. The model c...
Christian Bach, Salvatore Belardo, Jing Zhang
ELPUB
2007
ACM
14 years 2 months ago
Challenges in the Selection, Design and Implementation of an Online Submission and Peer Review System for STM Journals
Two international scientific publishers collaborated to develop an Online Submission and Peer Review System (OSPREY) for their journals. Our goals were to meet market demand, incr...
Judy Best, Richard Akerman