Sciweavers

1070 search results - page 154 / 214
» Awareness in Context-Aware Information Systems
Sort
View
ECIS
2004
13 years 9 months ago
Change management: the contribution of personal construct theory (PCT)
This paper explores the use of two complementary approaches, each stemming from Personal Construct Theory (PCT), to investigate the interdependence of organizations and informatio...
Laurence Brooks, Christopher J. Davis, Mark Lycett
CCS
2006
ACM
13 years 11 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
HCI
2007
13 years 9 months ago
Asymmetric Synchronous Collaboration Within Distributed Teams
Teams performing physical tasks must often be distributed in space, and are often organized hierarchically. This means that systems to support collaboration between members must ac...
Mark Ashdown, M. L. Cummings
SAC
2002
ACM
13 years 7 months ago
Collaborative attack modeling
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
Jan Steffan, Markus Schumacher
ICPP
2009
IEEE
14 years 2 months ago
CIFTS: A Coordinated Infrastructure for Fault-Tolerant Systems
—Considerable work has been done on providing fault tolerance capabilities for different software components on largescale high-end computing systems. Thus far, however, these fa...
Rinku Gupta, Pete Beckman, Byung-Hoon Park, Ewing ...