Sciweavers

319 search results - page 26 / 64
» Defining Requirements for an Incident Management System: A C...
Sort
View
DIM
2007
ACM
13 years 11 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
OIR
2007
123views more  OIR 2007»
13 years 7 months ago
The IP's guide to the galaxy of portal planning: part III - administrative framework
Purpose – This article is the third in a four-part series that aims to illustrate the process involved in planning a portal and creating a portal definition document. Design/me...
Amy M. Finley, Rebecca H. Augustyniak
ELECTRONICMARKETS
2010
124views more  ELECTRONICMARKETS 2010»
13 years 5 months ago
The difficulty of studying inter-organisational IS phenomena on large scales: critical reflections on a research journey
We argue that certain theoretical commitments that underpin much existing Interorganisational Information Systems (IOIS) research at small scales become untenable when IOIS are st...
Kai Reimers, Robert B. Johnston, Stefan Klein
CHI
2004
ACM
14 years 8 months ago
Email task management styles: the cleaners and the keepers
Email has become overloaded as users make use of email tools for performing a wide range of activities. Previous studies have demonstrated the different strategies employed by ema...
Jacek Gwizdka
WICSA
2004
13 years 9 months ago
Software Reconfiguration Patterns for Dynamic Evolution of Software Architectures
A software reconfiguration pattern is a solution to a problem in component-based software systems where the configuration needs to be updated while the system is operational. It d...
Hassan Gomaa, Mohamed Hussein