Sciweavers

1003 search results - page 99 / 201
» Understanding Availability
Sort
View
89
Voted
CHI
2010
ACM
15 years 1 months ago
The family window: the design and evaluation of a domestic media space
Families have a strong need to connect with their loved ones over distance. However, most technologies do not provide the same feelings of connectedness that one feels from seeing...
Tejinder K. Judge, Carman Neustaedter, Andrew F. K...
ICSE
2010
IEEE-ACM
15 years 1 months ago
Requirements reflection: requirements as runtime entities
Computational reflection is a well-established technique that gives a program the ability to dynamically observe and possibly modify its behaviour. To date, however, reflection is...
Nelly Bencomo, Jon Whittle, Peter Sawyer, Anthony ...
93
Voted
DSOM
2008
Springer
15 years 1 months ago
SYMIAN: A Simulation Tool for the Optimization of the IT Incident Management Process
Incident Management is the process through which IT support organizations manage to restore normal service operation after a service disruption. The complexity of IT support organi...
Claudio Bartolini, Cesare Stefanelli, Mauro Torton...
EDUTAINMENT
2008
Springer
15 years 1 months ago
Knowledge Discovery by Network Visualization
Hyperlinks among webpages are very important information and are widely used for webpage clustering and webpage ranking. With the explosive growth in the number of webpages availab...
Hong Zhou, Yingcai Wu, Ming-Yuen Chan, Huamin Qu, ...
ESORICS
2008
Springer
15 years 1 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen