Sciweavers

1324 search results - page 262 / 265
» Automation Controller for Operational IT Management
Sort
View
CCS
2008
ACM
13 years 10 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
ECIS
2003
13 years 10 months ago
From traditional to virtual organisation: implications for work unit boundaries
Boundary and virtual organisation theory were used to study the implications of organisation level virtualisation for work units. A single case study in a geographically dispersed...
Christopher J. Hemingway, Karin Breu
AAAI
1997
13 years 10 months ago
Deep Blue is Still an Infant
Webelieve that by the time of the workshopDeep Blue will havelost another matchto Garry Kasparov, showinglittle improvementover the previous one. But even if it is indeed a "...
Robert Levinson, Jeff Wilkinson
IFIP3
1998
151views Education» more  IFIP3 1998»
13 years 10 months ago
Conceptual Workflow Modelling for Remote Courses
Development of a wide spread project intended to teaching Computer Science, integrating a considerable number of students all over a country with big geographical extension and sc...
José Palazzo M. de Oliveira, Mariano Nicola...
ECR
2010
129views more  ECR 2010»
13 years 8 months ago
The design of a reliable reputation system
Next generation Web 2.0 communities and distributed P2P systems rely on the cooperation of diverse user populations spread across numerous administrative and security domains. Zero...
Gayatri Swamynathan, Kevin C. Almeroth, Ben Y. Zha...