Sciweavers

459 search results - page 26 / 92
» Designing for email response management
Sort
View
ACMSE
2006
ACM
15 years 3 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
PROFES
2007
Springer
15 years 3 months ago
An Industrial Survey of Software Outsourcing in China
Most studies of software outsourcing focus on how to manage the outsourcing from the perspective of the outsourcer, i.e., a company issuing a subcontract. There are few studies of ...
Jianqiang Ma, Jingyue Li, Weibing Chen, Reidar Con...
DAGSTUHL
2001
14 years 11 months ago
Execution-Time Plan Management for a Cognitive Orthotic System
In this paper we discuss our work on plan management in the Autominder cognitive orthotic system. Autominder is being designed as part of an initiative on the development of roboti...
Martha E. Pollack, Colleen E. McCarthy, Sailesh Ra...
IPCCC
2006
IEEE
15 years 3 months ago
Enabling mobility in enterprise security management
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
William Claycomb, Dongwan Shin
ACMDIS
2008
ACM
14 years 11 months ago
More than meets the eye: transforming the user experience of home network management
As computing migrates from the workplace to the home, householders must tackle problems of home network maintenance. Often they lack the technical knowledge or motivation to compl...
Erika Shehan Poole, Marshini Chetty, Rebecca E. Gr...