Sciweavers

3193 search results - page 617 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
PDP
2010
IEEE
14 years 2 months ago
SLA-driven Elastic Cloud Hosting Provider
—It is clear that Cloud computing is and will be a sea change for the Information Technology by changing the way in which both software and hardware are designed and purchased. I...
Josep Oriol Fito, Iñigo Goiri, Jordi Guitar...
ICRA
2009
IEEE
160views Robotics» more  ICRA 2009»
14 years 2 months ago
Tracking of facial features to support human-robot interaction
— In this paper we present a novel methodology for detection and tracking of facial features like eyes, nose and mouth in image sequences. The proposed methodology is intended to...
Maria Pateraki, Haris Baltzakis, Polychronis Konda...
MHCI
2009
Springer
14 years 2 months ago
Examining human values in adopting ubiquitous technology in school
This paper summarizes value analysis of adopting technologysupported attendance control service in a primary school. The results are based on a case study that explored a 14-week ...
Minna Isomursu, Mari Ervasti, Marianne Kinnula, Pe...
HICSS
2008
IEEE
124views Biometrics» more  HICSS 2008»
14 years 2 months ago
Measuring Factors that Influence the Success of E-Government Initiatives
Understanding how citizens value e-government services is critical to the success of these initiatives. This paper describes the development of a model to identify factors that in...
Ronnie Park
HICSS
2007
IEEE
164views Biometrics» more  HICSS 2007»
14 years 2 months ago
Supporting Knowledge Transfer through Decomposable Reasoning Artifacts
Technology to support knowledge transfer and cooperative inquiry must offer its users the ability to effectively interpret knowledge structures produced by collaborators. Communic...
William Pike, Richard May, Alan Turner