Sciweavers

2270 search results - page 320 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
HICSS
2003
IEEE
202views Biometrics» more  HICSS 2003»
15 years 9 months ago
Adoption Process of Upgrading Software: An Empirical Study of Windows XP
There are many studies in Information Systems on the adoption of new innovations. This paper, on the other hand, presents the findings of an empirical study, which explores factor...
Michael C. L. Lai, Susanna S. Y. Ho, Wendy W. Y. H...
DBPL
1989
Springer
165views Database» more  DBPL 1989»
15 years 8 months ago
Support for Data-Intensive Applications: Conceptual Design and Software Development
In the process of developing an Information System, one passes through stages that include requirements gathering, design specification, and software implementation. The purpose ...
Alexander Borgida, John Mylopoulos, Joachim W. Sch...
ICTAC
2005
Springer
15 years 10 months ago
A Rewriting Logic Sampler
Rewriting logic is a simple computational logic very well suited as a semantic framework within which many different models of computation, systems and languages can be naturally ...
José Meseguer
WORDS
2003
IEEE
15 years 9 months ago
Event-Driven Support of Real-Time Sentient Objects
The emergence of applications operating independently of direct human control is inevitable. Research on high-level models for this class of applications— e.g. on autonomous age...
Paulo Veríssimo, Antonio Casimiro
WCCE
2001
105views Education» more  WCCE 2001»
15 years 5 months ago
Designing an IT College
: The University of the United Arab Emirates (UAEU) commissioned an international panel of experts to devise a model curriculum for their new College of Information Technology. The...
Peter J. Denning, Ravi Athale, Nada Dabbagh, Danie...