Sciweavers

851 search results - page 93 / 171
» Managing (Requirements) Evolutions of High Assurance Systems
Sort
View
OTM
2007
Springer
15 years 7 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
HICSS
2003
IEEE
188views Biometrics» more  HICSS 2003»
15 years 7 months ago
A Collaborative Project Management Architecture
The Project Management (PM) paradigm is rapidly shifting due to business globalization and information technology (IT) advances that support distributed and virtual project teams....
Fang Chen, Nicholas C. Romano Jr., Jay F. Nunamake...
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 5 months ago
Power management of online data-intensive services
Much of the success of the Internet services model can be attributed to the popularity of a class of workloads that we call Online Data-Intensive (OLDI) services. These workloads ...
David Meisner, Christopher M. Sadler, Luiz Andr&ea...
SIGUCCS
2003
ACM
15 years 7 months ago
Teamwork is the heart of technology
IAT Services, the central Information Technology group at the University of Missouri-Columbia, operates computing sites in general access, classroom, and residence hall settings. ...
Tammy Hohlt, Kristina A. Cunningham
WWW
2005
ACM
16 years 2 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten