Sciweavers

820 search results - page 106 / 164
» Memory System Connectivity Exploration
Sort
View
BIS
2008
119views Business» more  BIS 2008»
15 years 4 months ago
Influence Factors of Understanding Business Process Models
The increasing utilization of business process models both in business analysis and information systems development raises several issues regarding quality measures. In this contex...
Jan Mendling, Mark Strembeck
JASIS
2006
99views more  JASIS 2006»
15 years 3 months ago
Changing the pace of search: Supporting background information seeking
Almost all Web searches are carried out while the user is sitting at a conventional desktop computer, connected to the Internet. Although online, handheld, mobile search offers ne...
Matt Jones, George Buchanan, Tzu-Chiang Cheng, Pre...
TC
1998
15 years 3 months ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine
116
Voted
SOFTWARE
2002
15 years 3 months ago
Handling Uncertainty in a Medical Study of Dietary Intake During Pregnancy
This paper is concerned with handling uncertainty as part of the analysis of data from a medical study. The study is investigating connections between the birth weight of babies an...
Adele H. Marshall, David A. Bell, Roy Sterritt
HICSS
2005
IEEE
114views Biometrics» more  HICSS 2005»
15 years 9 months ago
Team Pattern Recognition: Sharing Cognitive Chunks Under Time Pressure
This study extends the theory of Recognition Primed Decision-Making by applying it to groups. Furthermore, we explore the application of Template Theory to collaboration. An exper...
Stephen C. Hayne, C. A. P. Smith, Leo R. Vijayasar...