Sciweavers

416 search results - page 29 / 84
» Enough of Processes - Lets do Practices
Sort
View
102
Voted
IJIPT
2010
147views more  IJIPT 2010»
14 years 8 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
EUROMICRO
2007
IEEE
15 years 4 months ago
Understanding Success and Failure Profiles of ERP Requirements Engineering: an Empirical Study
Organizations adopting Enterprise Resource Planning (ERP) are also adopting standard ERPvendor-specific process models for engineering their requirements. Making successfully a li...
Maya Daneva
ECSCW
2011
13 years 9 months ago
The Pendulum of Standardization
Cooperation and collaboration are generally an inherent part of everyday practice, and particularly among nurses. However, the technologies that support these practices are still i...
Torbjørg Meum, Eric Monteiro, Gunnar Elling...
ICAS
2005
IEEE
171views Robotics» more  ICAS 2005»
15 years 3 months ago
AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure
Access to Grid services is currently limited to devices having substantial computing, network and memory resources such as PCs. On the other hand, most of mobile devices do not ha...
Ali Sajjad, Hassan Jameel, Umar Kalim, Sangman Han...
WDAG
2004
Springer
103views Algorithms» more  WDAG 2004»
15 years 3 months ago
Relationships Between Broadcast and Shared Memory in Reliable Anonymous Distributed Systems
We study the power of reliable anonymous distributed systems, where processes do not fail, do not have identifiers, and run identical programmes. We are interested specifically i...
James Aspnes, Faith Ellen Fich, Eric Ruppert