Sciweavers

196 search results - page 32 / 40
» Examining risk attitudes
Sort
View
ECBS
2005
IEEE
126views Hardware» more  ECBS 2005»
15 years 5 months ago
Toward Introducing Notification Technology into Distributed Project Teams
Software development can be thought of as the evolution act requirements into a concrete software system. The evolution, achieved through a successive series of elaborations and r...
Jamie L. Smith, Shawn A. Bohner, D. Scott McCricka...
HICSS
2005
IEEE
145views Biometrics» more  HICSS 2005»
15 years 5 months ago
Differential Interaction and Attribution in Collocated and Distributed Large-Scale Collaboration
Large-scale, group-to-group collaboration is an emerging trend, yet has so far not received much attention. We performed an ethnographic study to examine how interaction and perce...
Gloria Mark, Steve Abrams
HICSS
2005
IEEE
370views Biometrics» more  HICSS 2005»
15 years 5 months ago
Strategic Information Technology Management: Managing Organizational, Political, and Technological Forces
This paper explores the role of Information Technology (IT) in the management of municipally-owned and operated public utilities. Through semi-structured interviews of senior mana...
Keith Schildt, Suzanne Beaumaster, Marcie Edwards
PET
2005
Springer
15 years 5 months ago
Failures in a Hybrid Content Blocking System
Abstract. Three main methods of content blocking are used on the Internet: blocking routes to particular IP addresses, blocking specific URLs in a proxy cache or firewall, and pr...
Richard Clayton
IFM
2004
Springer
125views Formal Methods» more  IFM 2004»
15 years 5 months ago
Formally Justifying User-Centred Design Rules: A Case Study on Post-completion Errors
Abstract. Interactive systems combine a human operator with a computer. Either may be a source of error. The veri cation processes used must ensure both the correctness of the comp...
Paul Curzon, Ann Blandford