Sciweavers

773 search results - page 121 / 155
» An iTask Case Study: A Conference Management System
Sort
View
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
15 years 7 months ago
Pervasive Real-Time IT as a Disruptive Technology for the IS Field
This paper builds on ideas in a recent paper which argued that the core subject matter of the IS field should not be “the IT artifact” (as suggested by Orlikowski and Iacono [...
Steven Alter
135
Voted
CAISE
2006
Springer
15 years 5 months ago
Loosely-Coupled Process Automation in Medical Environments
Abstract. We discuss a case study for the hospital scenario where workflow model components are distributed across various computers or devices (e.g. mobile phones, PDAs, sensors, ...
Jurate Vysniauskaite
140
Voted
DC
1999
15 years 1 months ago
A Simple and Fast Asynchronous Consensus Protocol Based on a Weak Failure Detector
or fault-tolerant asynchronous systems. It abstracts a family of problems known as Agreement (or Coordination) problems. Any solution to consensus can serve as a basic building blo...
Michel Hurfin, Michel Raynal
SAC
2005
ACM
15 years 7 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
76
Voted
HICSS
2008
IEEE
91views Biometrics» more  HICSS 2008»
15 years 8 months ago
Governance Structures in Cross-Boundary Information Sharing: Lessons from State and Local Criminal Justice Initiatives
Governments are increasingly using collaborative, cross-boundary strategies to face complex social problems. Many of these cross-boundary initiatives have at their core the use, a...
Theresa A. Pardo, José Ramón Gil-Gar...