Sciweavers

739 search results - page 144 / 148
» Security Challenges in Cloud Computing
Sort
View
CSCW
2006
ACM
15 years 3 months ago
A grounded theory of information sharing behavior in a personal learning space
This paper presents a grounded theory of information sharing behavior of the users of a personal learning space. A personal learning space is an environment consisted of weblog, e...
Maryam Najafian Razavi, Lee Iverson
DCOSS
2005
Springer
15 years 3 months ago
Coordinated Static and Mobile Sensing for Environmental Monitoring
Distributed embedded sensor networks are now being successfully deployed in environmental monitoring of natural phenomena as well as for applications in commerce and physical secur...
Richard Pon, Maxim A. Batalin, Victor Chen, Aman K...
OOPSLA
2005
Springer
15 years 3 months ago
Estimating software based on use case points
It is well documented that software product cost estimates are notoriously inaccurate across the software industry. Creating accurate cost estimates for software product developme...
Edward R. Carroll
CSCW
2004
ACM
15 years 3 months ago
Maintaining redundancy in the coordination of medical emergencies
This paper reports from a study of Norwegian medical emergency call (AMK) centres, in which advanced radio and telephone communication technologies are handled by a team of nurses...
Aksel Tjora
79
Voted
DMSN
2004
ACM
15 years 3 months ago
Active rules for sensor databases
Recent years have witnessed a rapidly growing interest in query processing in sensor and actuator networks. This is mainly due to the increased awareness of query processing as th...
Michael Zoumboulakis, George Roussos, Alexandra Po...