Sciweavers

3899 search results - page 742 / 780
» Argumentation for Access Control
Sort
View
MOBIHOC
2004
ACM
14 years 1 months ago
On the behavior of communication links of a node in a multi-hop mobile environment
In this work, we develop an analytical framework to investigate the behavior of the communication links of a node in a random mobility environment. Analytical expressions characte...
Prince Samar, Stephen B. Wicker
PDC
2004
ACM
14 years 1 months ago
Participatory design in community computing contexts: tales from the field
As technology becomes more embedded in our daily lives, there is a great deal of hope about the use of information technology to achieve positive community outcomes like increasin...
Cecelia Merkel, Lu Xiao, Umer Farooq, Craig H. Gan...
ICCS
2004
Springer
14 years 1 months ago
A Framework for Online Inversion-Based 3D Site Characterization
Our goal is to develop the capability for characterizing the three-dimensional geological structure and mechanical properties of individual sites and complete basins in earthquake-...
Volkan Akcelik, Jacobo Bielak, George Biros, Ioann...
XPU
2004
Springer
14 years 1 months ago
An Agile Approach to a Legacy System
We describe how a small, successful, self-selected XP team approached a seemingly intractable problem with panache, flair and immodesty. We rewrote a legacy application by deliver...
Chris Stevenson, Andy Pols
HICSS
2003
IEEE
144views Biometrics» more  HICSS 2003»
14 years 1 months ago
Democracy Functions of Information Technology
Information Technology, IT, may play an important part in any community as a supporting tool in the democratic process. The conditions for that to happen are primarily a genuine w...
Gunnar Lidén, Anders Avdic