Sciweavers

1733 search results - page 22 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 5 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
15 years 7 months ago
Development and Validation of Scales to Measure the Strategic Potential of IT-Enabled Resources: A Resource-Based Approach
This paper describes the development of reliable and valid scales for assessing the strategic potential of IT-enabled resources. Following to the resource-based view of the firm (...
Saggi Nevo, Michael R. Wade
IJCNLP
2005
Springer
15 years 6 months ago
Using Multiple Discriminant Analysis Approach for Linear Text Segmentation
Research on linear text segmentation has been an on-going focus in NLP for the last decade, and it has great potential for a wide range of applications such as document summarizati...
Jingbo Zhu, Na Ye, Xinzhi Chang, Wenliang Chen, Be...
CAI
2007
Springer
15 years 7 months ago
From Algebraic Graph Transformation to Adhesive HLR Categories and Systems
In this paper, we present an overview of algebraic graph transformation in the double pushout approach. Basic results concerning independence, parallelism, concurrency, embedding, ...
Ulrike Prange, Hartmut Ehrig
ECIS
2004
15 years 2 months ago
Context Engineering: An IS Development Research Agenda
The authors present the Context Engineering (CE) approach to Information Systems Development (ISD) as a framework to organise ideas about previous development experience and to gu...
Licinio Roque, Ana Almeida, António Dias de...