Sciweavers

399 search results - page 27 / 80
» Enterprise Modeling for Information System Development withi...
Sort
View
HICSS
2005
IEEE
127views Biometrics» more  HICSS 2005»
15 years 3 months ago
Wholly Owned Offshore Subsidiaries for IT Development: A Program of Research
Information Technology (IT) offshore outsourcing is a non-reversible trend due to its cost implications, and as a result, target of much inquiry in different areas of knowledge. W...
J. Roberto Evaristo, Jorge Luis Nicolas Audy, Rafa...
ETS
2002
IEEE
121views Hardware» more  ETS 2002»
14 years 9 months ago
Interactions of organizational culture and collaboration in working and learning
This paper reports the methodologies and findings of research done by the Enterprise Social Learning Architecture (ESLA) Task into learning processes in two diverse environments w...
Irena M. Ali, Celina Pascoe, Leoni Warne
CSFW
2005
IEEE
15 years 3 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
CIA
2008
Springer
14 years 11 months ago
Collaborative Load-Balancing in Storage Networks Using Agent Negotiation
Abstract. The rapid advances in the computer industry allow building larger systems that require mass storage volumes. As storage space increases, its management becomes increasing...
Shay Raz, Raz Lin, Onn Shehory
SIGSOFT
2002
ACM
15 years 10 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...