Sciweavers

1739 search results - page 317 / 348
» Service Morphing: Integrated System- and Application-Level S...
Sort
View
82
Voted
HICSS
2007
IEEE
126views Biometrics» more  HICSS 2007»
15 years 6 months ago
Contract as a Source of Trust--Commitment in Successful IT Outsourcing Relationship: An Empirical Study
Existing studies on IT outsourcing have mainly examined partnership factors that influence IT outsourcing effectiveness. This stream of IT outsourcing research has largely ignored...
Jahyun Goo, Kichan Nam
HICSS
2007
IEEE
145views Biometrics» more  HICSS 2007»
15 years 6 months ago
Measuring Knowledge Management Projects: Fitting the Mosaic Pieces Together
This paper seeks to develop an integrated perspective on knowledge management (KM) project measurement. Based on a review of the existing literature, a theoretical framework which...
Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh
ICDCSW
2007
IEEE
15 years 6 months ago
Context to Make You More Aware
The goal of our work is to help users make more informed choices about what physical activities they undertake. One example is to provide relevant information to help someone choo...
Adrienne H. Andrew, Yaw Anokwa, Karl Koscher, Jona...
VTC
2007
IEEE
101views Communications» more  VTC 2007»
15 years 6 months ago
Secure Position-Based Routing for VANETs
— Vehicular communication (VC) systems have the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment. So fa...
Charles Harsch, Andreas Festag, Panos Papadimitrat...
CCS
2007
ACM
15 years 6 months ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...