Sciweavers

730 search results - page 136 / 146
» Modeling trust in collaborative information systems
Sort
View
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
15 years 6 months ago
Service Oriented Architecture: Challenges for Business and Academia
Today, the means for attaining competitive advantage with information technology (IT) has shifted from efficiently managing the organization's operations to discovering ways ...
Amelia Maurizio, James Sager, Peter Jones, Gail Co...
ACE
2004
193views Education» more  ACE 2004»
15 years 1 months ago
Conversational KM - Student Driven Learning
A conversational method of teaching whereby the students engage each other as a key part of the learning experience achieves a higher percentage of high grades (and presumably bet...
Marilyn A. Wells, Phillip W. Brook
SIGUCCS
2009
ACM
15 years 4 months ago
Frontline support at Princeton University: a centralized and decentralized approach
Frontline support and maintenance for desktop hardware and software systems at Princeton University has been uniquely structured, allowing the benefits of centralization and the f...
Maureen A. Novozinsky, Evelyne S. Roach, Leila M. ...
ECAI
2004
Springer
15 years 5 months ago
Emergence of Complex Networks through Local Optimization
Abstract. The emergence of complex network structures of relationships between autonomous agents occurs in a wide range of distributed systems. Many researchers have proposed model...
Josep M. Pujol, Andreas Flache, Ramon Sangües...
SOSP
2003
ACM
15 years 8 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...