Sciweavers

751 search results - page 31 / 151
» How to Make Business with Computer Vision Technology
Sort
View
SECURWARE
2007
IEEE
15 years 3 months ago
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services
—In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements sinc...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
ACMDIS
2006
ACM
15 years 3 months ago
Morphome: a constructive field study of proactive information technology in the home
This paper presents the main results of a three-year long field and design study of proactive information technology in the home. This technology uses sensors to track human activ...
Ilpo Koskinen, Kristo Kuusela, Katja Battarbee, An...
ICSOC
2007
Springer
15 years 3 months ago
Contextualized B2B Registries
Service discovery is a fundamental concept underpinning the move towards dynamic service-oriented business partnerships. The business process for integrating service discovery and ...
Uwe Radetzki, Mike J. Boniface, Mike Surridge
CHI
2010
ACM
15 years 4 months ago
Homeless young people's experiences with information systems: life and work in a community technology center
This paper explores how homeless young people, aged 1325, make use of information systems in daily life. Observed in a community technology center, four different examples of uses...
Jill Palzkill Woelfer, David G. Hendry
ESWS
2005
Springer
15 years 3 months ago
The Semantic Grid: Past, Present and Future
—Grid computing offers significant enhancements to our capabilities for computation, information processing and collaboration, and has exciting ambitions in many fields of endeav...
David De Roure