Sciweavers

536 search results - page 101 / 108
» Deconstructing process isolation
Sort
View
MMMACNS
2005
Springer
14 years 2 months ago
A Passive External Web Surveillance Technique for Private Networks
The variety and richness of what users browse on the Internet has made the communications of web-browsing hosts an attractive target for surveillance. We show that passive external...
Constantine Daicos, Scott Knight
UML
2004
Springer
14 years 1 months ago
Open Issues in Industrial Use Case Modeling
Use Cases have achieved wide use as a specification tool for observable behavior of systems. However, there is still much controversy, inconsistent use, and free-flowing interpreta...
Gonzalo Génova, Juan Llorens Morillo, Pierr...
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
14 years 1 months ago
Impact of Technology Sustainability on Healthcare Governance
Healthcare technology investments must be borne by charity, government subsidy, or patient reimbursement. Such investments can be expensive and require partnerships of public and ...
Thomas Lee Rodgers, Evan E. Anderson, Ming Yuan, T...
GROUP
2003
ACM
14 years 1 months ago
"Breaking the code", moving between private and public work in collaborative software development
Software development is typically cooperative endeavor where a group of engineers need to work together to achieve a common, coordinated result. As a cooperative effort, it is esp...
Cleidson R. B. de Souza, David F. Redmiles, Paul D...
AMKM
2003
Springer
14 years 1 months ago
Agentized, Contextualized Filters for Information Management
Every time a user engaged in work reads or writes, the user spontaneously generates new information needs: to understand the text he or she is reading or to supply more substance ...
David A. Evans, Gregory Grefenstette, Yan Qu, Jame...