Sciweavers

1690 search results - page 305 / 338
» A Security Framework for JXTA-Overlay
Sort
View
ECIS
2003
13 years 10 months ago
Adoption trends in application service provisioning: an exploratory field study of small and medium-size enterprises
This paper describes an exploratory field study on the adoption of Application Service Provisioning (ASP) in Small and Medium-sized Enterprises (SMEs). Rooted in Merton’s Motiva...
Ryan Peterson, Alea M. Fairchild
DS
1997
104views Database» more  DS 1997»
13 years 10 months ago
Managing Constraint Violations in Administrative Information Systems
This paper motivates a comprehensive methodological framework for dealing with some aspects of real-world complexity in information system analysis and design. By complex applicat...
I. Boydens, Alain Pirotte, Esteban Zimányi
AIS
2007
Springer
13 years 8 months ago
Unplanned effects of intelligent agents on Internet use: a social informatics approach
This paper instigates a discourse on the unplanned effects of intelligent agents in the context of their use on the Internet. By utilizing a social informatics framework as a lens...
Alexander Serenko, Umar Ruhi, Mihail Cocosila
ENTCS
2008
110views more  ENTCS 2008»
13 years 8 months ago
Game-Based Probabilistic Predicate Abstraction in PRISM
ion in PRISM1 Mark Kattenbelt Marta Kwiatkowska Gethin Norman David Parker Oxford University Computing Laboratory, Oxford, UK Modelling and verification of systems such as communi...
Mark Kattenbelt, Marta Z. Kwiatkowska, Gethin Norm...
FUIN
2008
128views more  FUIN 2008»
13 years 8 months ago
Impact of Asynchrony on the Behavior of Rational Selfish Agents
The behavior of rational selfish agents has been classically studied in the framework of strategic games in which each player has a set of possible actions, players choose actions ...
David Ilcinkas, Andrzej Pelc