Sciweavers

2746 search results - page 484 / 550
» Case Study in Survivable Network System Analysis
Sort
View
ECIS
2004
15 years 2 months ago
Leveraging Theoretical Pluralism in qualitative IS research: The example of IS professionals' identity as a complex phenomenon
As Information Systems (IS) research increasingly acknowledges the importance of non-positivist approaches, the case for a plurality of theories to guide qualitative studies has g...
Jo-Ann Siregar, Michael T. K. Tan
COMPSAC
2007
IEEE
15 years 5 months ago
Infrastructure Hardening: A Competitive Coevolutionary Methodology Inspired by Neo-Darwinian Arms Races
The world is increasingly dependent on critical infrastructures such as the electric power grid, water, gas, and oil transport systems, which are susceptible to cascading failures...
Travis C. Service, Daniel R. Tauritz, William M. S...
ACMDIS
2010
ACM
15 years 1 months ago
Design from the everyday: continuously evolving, embedded exploratory prototypes
One of the major challenges in the design of social technologies is the evaluation of their qualities of use and how they are appropriated over time. While the field of HCI abound...
Clint Heyer, Margot Brereton
HPCA
2011
IEEE
14 years 5 months ago
Essential roles of exploiting internal parallelism of flash memory based solid state drives in high-speed data processing
Flash memory based solid state drives (SSDs) have shown a great potential to change storage infrastructure fundamentally through their high performance and low power. Most recent ...
Feng Chen, Rubao Lee, Xiaodong Zhang
SAC
2005
ACM
15 years 7 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla