Sciweavers

Share
8 search results - page 1 / 2
» System-level design tools: who needs them, who has them, and...
Sort
View
SOUPS
2009
ACM
12 years 8 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
SIGUCCS
2000
ACM
12 years 5 months ago
Developing and Implementing a Comprehensive Training and Incentive Program for Student Employees in Information Technology
Anyone who works with student employees knows that while it is often difficult to train sufficiently, it is of the utmost importance to have a qualified, knowledgeable staff. We w...
Jim Osborn
HUC
2011
Springer
11 years 1 months ago
Understanding my data, myself: supporting self-reflection with ubicomp technologies
We live in a world where many kinds of data about us can be collected and more will be collected as Ubicomp technologies mature. People reflect on this data using different tools ...
Ian Li, Anind K. Dey, Jodi Forlizzi
SIGUCCS
2003
ACM
12 years 7 months ago
Training program growth...: from flat line to pulsating
IT Training and Communications is a division of Information Technology Services (ITS), which provides computer application training for the faculty and staff at Saint Louis Univer...
Sue A. Moore
books