Sciweavers

13436 search results - page 96 / 2688
» e
Sort
View
IJMMS
2008
119views more  IJMMS 2008»
15 years 4 months ago
Collaboration and co-ordination in mature eXtreme programming teams
Mature eXtreme programming (XP) teams are highly collaborative and self-organising. In previous studies, we have observed that these teams rely on two apparently simple mechanisms...
Helen Sharp, Hugh Robinson
159
Voted
JSW
2008
240views more  JSW 2008»
15 years 4 months ago
A Secure e-Health Architecture based on the Appliance of Pseudonymization
Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massiv...
Bernhard Riedl, Veronika Grascher, Thomas Neubauer
JTAER
2008
100views more  JTAER 2008»
15 years 4 months ago
Securing Uniqueness of Rights e-Documents: A Deontic Process Perspective
We typically think of documents as carrying information. However, certain kinds of documents do more than that: they are not only informative but also performative in that they re...
Ronald M. Lee, Vu Nguyen, Anastasia Pagnoni
MONET
2008
127views more  MONET 2008»
15 years 4 months ago
Provisioning of Parameterized Quality of Service in 802.11e Based Wireless Mesh Networks
There has been a growing interest in the use of wireless mesh networks. Today's wireless technology enables very high data rate up to hundreds of Megabits per second, which c...
Xiaowen Chu
JTAER
2006
143views more  JTAER 2006»
15 years 4 months ago
P2P's Significance for eBusiness: Towards a Research Agenda
Applications running over peer-to-peer (P2P) networks have exploded since the late 1990s. Research is needed into many aspects of P2P. These include architecture, application func...
Roger Clarke