Sciweavers

196 search results - page 31 / 40
» Examining risk attitudes
Sort
View
CHIMIT
2009
ACM
15 years 6 months ago
Scripting practices in complex systems management
System administrators are end-users too. And as end-users, they develop tools, create web pages, write command-line scripts, use spreadsheets, and repurpose existing tools. In sho...
Eser Kandogan, Paul P. Maglio, Eben M. Haber, John...
AIMS
2008
Springer
15 years 6 months ago
Towards Resilient Community Wireless Mesh Networks
Abstract. Wireless Mesh Networks are an increasingly common technology providing connectivity in many communities, particularly where Internet access is unavailable or restricted v...
Sara Bury, Nicholas J. P. Race
96
Voted
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
15 years 5 months ago
The Role of Collective Mental Models in IOS Adoption: Opening the Black Box of Rationality in RFID Deployment
ABSTRACT. Risks associated with change in technology standards and uncertainty over the sharing of costs and benefits among trading partners impede interorganizational information ...
Frederick J. Riggins, Kelly T. Slaughter
INFOSCALE
2006
ACM
15 years 5 months ago
Exploiting P2P systems for DDoS attacks
— When a P2P system has millions of concurrently active peers, there is the risk that it could serve as a DDoS engine for attacks against a targeted host. In this paper we descri...
Naoum Naoumov, Keith W. Ross
ECBS
2005
IEEE
164views Hardware» more  ECBS 2005»
15 years 5 months ago
The Impact of Agile Methods on Software Project Management
As more and more software projects engage Agile Methods, there are emerging patterns of success and failure. With growing adoption of Agile Methods, project managers increasingly ...
Michael Coram, Shawn A. Bohner