Sciweavers

3619 search results - page 7 / 724
» How Long Will It Take
Sort
View
IPCCC
2007
IEEE
15 years 10 months ago
Self-Adaptive Two-Dimensional RAID Arrays
We propose increasing the survivability of data stored in two-dimensional RAID arrays by letting these arrays reorganize themselves whenever they detect a disk failure. This reorg...
Jehan-François Pâris, Thomas J. E. Sc...
CHI
2003
ACM
16 years 4 months ago
Take it to the next stage: the roles of role playing in the design process
Using role play at every stage of the design process has been a vital tool for IDEO in working with clients and users. With the dual properties of bringing participants into the m...
Kristian T. Simsarian
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
15 years 9 months ago
"Yeah, the Rush ain't here yet - Take a break": Creation and Use of an Artifact as Organizational Memory
In order to understand organizational memory, it is important to understand how things become adopted as memory resources in organizations. In this paper, we describe the genesis ...
Christine Halverson, Mark S. Ackerman
125
Voted
ICICS
2005
Springer
15 years 9 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
IPPS
2000
IEEE
15 years 8 months ago
Take Advantage of the Computing Power of DNA Computers
Ever since Adleman [1] solved the Hamilton Path problem using a combinatorial molecular method, many other hard computational problems have been investigated with the proposed DNA ...
Zhiquan Frank Qiu, Mi Lu