Sciweavers

669 search results - page 115 / 134
» Managing the Risk of IT Outsourcing
Sort
View
ECBS
2006
IEEE
112views Hardware» more  ECBS 2006»
14 years 2 months ago
A Goal-Oriented Approach for Safety Requirements Specification
Robotic systems are developed to execute tasks with several types of risks associated. The possible damages that can affect both the working environment and the self-system lead u...
Elena Navarro, Pedro Sánchez, Patricio Lete...
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
14 years 2 months ago
The Role of Collective Mental Models in IOS Adoption: Opening the Black Box of Rationality in RFID Deployment
ABSTRACT. Risks associated with change in technology standards and uncertainty over the sharing of costs and benefits among trading partners impede interorganizational information ...
Frederick J. Riggins, Kelly T. Slaughter
SWS
2006
ACM
14 years 2 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
ICRA
2005
IEEE
173views Robotics» more  ICRA 2005»
14 years 2 months ago
Decision Networks for Repair Strategies in Speech-Based Interaction with Mobile Tour-Guide Robots
– The main task of a voice-enabled tour-guide robot in mass exhibition setting is to engage visitors in dialogue and provide as much exhibit information as possible in a limited ...
Plamen J. Prodanov, Andrzej Drygajlo
RTCSA
2005
IEEE
14 years 2 months ago
An Overview of the VigilNet Architecture
Battlefield surveillance often involves a high element of risk for military operators. Hence, it is very important for the military to execute unmanned surveillance by using larg...
Tian He, Liqian Luo, Ting Yan, Lin Gu, Qing Cao, G...