Sciweavers

773 search results - page 100 / 155
» An iTask Case Study: A Conference Management System
Sort
View
MMNS
1997
131views Multimedia» more  MMNS 1997»
13 years 10 months ago
A new flexible and modular QoS mapping framework based on psychophysics
Accounting for the perceiving conditions that make up the delivery environment of an application helps improve the efficiency of QoS provisioning systems. It is useless to transmi...
Constant Gbaguidi, Olivier Verscheure, Jean-Pierre...
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
14 years 2 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke
JTAER
2006
100views more  JTAER 2006»
13 years 8 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
TII
2011
206views Education» more  TII 2011»
13 years 3 months ago
Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Simona Bernardi, Javier Campos, José Merseg...
MSR
2006
ACM
14 years 2 months ago
Are refactorings less error-prone than other changes?
Refactorings are program transformations which should preserve the program behavior. Consequently, we expect that during phases when there are mostly refactorings in the change hi...
Peter Weißgerber, Stephan Diehl