Sciweavers

2236 search results - page 226 / 448
» Secure Software Design in Practice
Sort
View
141
Voted
CHI
2009
ACM
15 years 10 months ago
Coordinating tasks on the commons: designing for personal goals, expertise and serendipity
How is work created, assigned, and completed on large-scale, crowd-powered systems like Wikipedia? And what design principles might enable these federated online systems to be mor...
Michel Krieger, Emily Margarete Stark, Scott R. Kl...
198
Voted
EDOC
2011
IEEE
14 years 3 months ago
Towards an Agile Design of the Enterprise Architecture Management Function
Abstract—Enterprise architecture (EA) management provides an engineering approach for the continuous advancement of the enterprise as a whole. The high number of involved compone...
Sabine Buckl, Florian Matthes, Ivan Monahov, Sasch...
CIMCA
2008
IEEE
15 years 9 months ago
Analysing Boundary Objects to Develop Results that Support Business Goals
In this study of eight outsourcing projects, we seek to understand the mechanisms that companies put in place to coordinate knowledge work across their boundaries. We find that m...
María Laura Ponisio, Peter Vruggink
184
Voted
SIGMOD
2008
ACM
119views Database» more  SIGMOD 2008»
16 years 3 months ago
Report on the Principles of Provenance Workshop
Provenance, or records of the origin, context, custody, derivation or other historical information about a (digital) object, has recently become an important research topic in a n...
James Cheney, Peter Buneman, Bertram Ludäscher
CISSE
2008
Springer
15 years 5 months ago
Anonymity Leakage Reduction in Network Latency
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity ...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome