Sciweavers

1121 search results - page 177 / 225
» Logics of Complementarity in Information Systems
Sort
View
CSCW
2004
ACM
14 years 2 months ago
Return on investment and organizational adoption
This paper considers the complexity of measuring the return on investment for technology adoption. A brief case study of technology adoption in a large design and construction fir...
Jonathan Grudin
EKAW
2004
Springer
14 years 2 months ago
Graph-Based Acquisition of Expressive Knowledge
Capturing and exploiting knowledge is at the heart of several important problems such as decision making, the semantic web, and intelligent agents. The captured knowledge must be a...
Vinay K. Chaudhri, Kenneth S. Murray, John Pacheco...
CCS
2003
ACM
14 years 2 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
COOPIS
2002
IEEE
14 years 1 months ago
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Konstantin Beznosov
HICSS
1999
IEEE
111views Biometrics» more  HICSS 1999»
14 years 1 months ago
T Spaces: The Next Wave
Millions of small heterogeneous computers are poised to spread into the infrastructure of our society. Though mostly inconspicuous today, disguised as nothing more than PIM (perso...
Tobin J. Lehman, Stephen W. McLaughry, Peter Wycko...