Sciweavers

1456 search results - page 105 / 292
» Keeping encountered information
Sort
View
130
Voted
ACSW
2003
15 years 3 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
ECSCW
2001
15 years 3 months ago
On finding things out: Situating organisational knowledge in CSCW
We present a field study of an organisation which designs and constructs precision mechatronic devices, which typically integrate electronics, mechanical assemblies, computer hardw...
Kristina Groth, John Bowers
OAS
2003
15 years 3 months ago
Experiences with Ontology Development for Value-Added Publishing
This paper presents our practical experience of developing an ontology using the EXPLODE method for Value-Added Publishing. Value-Added Publishing is a relatively new area of elec...
Maia Hristozova, Leon Sterling
EJIS
2006
79views more  EJIS 2006»
15 years 1 months ago
A genealogical study of boundary-spanning IS design
This paper presents the design of a business-aligned information system (IS) from an actor-network perspective, viewing non-human intermediaries jointly as inscriptions and bounda...
Susan Gasson
JNW
2008
171views more  JNW 2008»
15 years 1 months ago
The Necessity of Semantic Technologies in Grid Discovery
Service discovery and its automation are some of the key features that a large scale, open distributed system must provide so that clients and users may take advantage of shared re...
Serena Pastore