Sciweavers

1166 search results - page 137 / 234
» Negotiating Using Rewards
Sort
View
ISPW
2005
IEEE
14 years 3 months ago
A Value-Based Process for Achieving Software Dependability
Since different systems have different success-critical stakeholders, and these stakeholders depend on the system in different ways, using traditional one-size-fits-all dependabili...
LiGuo Huang
MLMI
2005
Springer
14 years 3 months ago
Analysing Meeting Records: An Ethnographic Study and Technological Implications
Whilst there has been substantial research into technology to support meetings, there has been relatively little study of how meeting participants currently make records and how th...
Steve Whittaker, Rachel Laban, Simon Tucker
AI
2004
Springer
14 years 3 months ago
A Principled Modular Approach to Construct Flexible Conversation Protocols
Building conversation protocols has traditionally been an art more than a science, as their construction is often guided by designers’ intuition rather than by a principled appro...
Roberto A. Flores, Robert C. Kremer
CCS
2004
ACM
14 years 3 months ago
Concealing complex policies with hidden credentials
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing ...
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons
RE
2004
Springer
14 years 3 months ago
Understanding Requirements in Enterprise Systems Projects
Due to the generality and complexity of enterprise systems, they are challenging to implement and deploy successfully in organizations. Many of these problems are rooted in the wa...
Jon Atle Gulla