Sciweavers

4674 search results - page 101 / 935
» cases 2008
Sort
View
USS
2008
15 years 2 months ago
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications
We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We fin...
Alexei Czeskis, David J. St. Hilaire, Karl Koscher...
ACMDIS
2008
ACM
15 years 1 months ago
Paper interface to electronic medical records: a case of usage-driven technology appropriation
We conducted a 6-month project with a physical therapy clinic, involving equal parts ethnographic fieldwork and rapid prototyping. It differed from most reported user-informed des...
Elin Rønby Pedersen, Greg Wolff
ACMICEC
2008
ACM
255views ECommerce» more  ACMICEC 2008»
15 years 1 months ago
Business strategy-IT alignment in a multi-actor setting: a mobile e-service case
In this paper we present a framework and methodology for aligning the business strategy and IT/IS for an organization offering an e-service in a multi-organizational setting. We e...
Vincent Pijpers, Jaap Gordijn, Hans Akkermans
AISC
2008
Springer
15 years 1 months ago
Case Studies in Model Manipulation for Scientific Computing
Abstract. The same methodology is used to develop 3 different applications. We begin by using a very expressive, appropriate Domain Specific Language, to write down precise problem...
Jacques Carette, Spencer Smith, John McCutchan, Ch...
ATAL
2008
Springer
15 years 1 months ago
Electronic contracting in aircraft aftercare: a case study
Distributed systems comprised of autonomous self-interested entities require some sort of control mechanism to ensure the predictability of the interactions that drive them. This ...
Felipe Rech Meneguzzi, Simon Miles, Michael Luck, ...