Sciweavers

929 search results - page 120 / 186
» Personal information management with SEMEX
Sort
View
RE
2001
Springer
14 years 3 days ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...
AIWORC
2000
IEEE
14 years 3 days ago
Building Flexible Mobile Applications for Next Generation Enterprises
In order to understand and gain practical insights into various aspects of Next Generation Enterprises, we are building a testbed for flexible mobile applications. We started with...
Karun Karunanithi, Khurram Haneef, Bruno Cordioli,...
HICSS
1999
IEEE
111views Biometrics» more  HICSS 1999»
13 years 12 months ago
T Spaces: The Next Wave
Millions of small heterogeneous computers are poised to spread into the infrastructure of our society. Though mostly inconspicuous today, disguised as nothing more than PIM (perso...
Tobin J. Lehman, Stephen W. McLaughry, Peter Wycko...
HOTOS
1999
IEEE
13 years 12 months ago
Caching Documents with Active Properties
Caching in the Placeless Documents system poses new challenges because users can attach active properties to documents. Active properties can modify the document's content as...
Eyal de Lara, Karin Petersen, Douglas B. Terry, An...
ICSE
1999
IEEE-ACM
13 years 12 months ago
Product-Line Architectures in Industry: A Case Study
In this paper, a case study investigating the experiences from using product-line architectures is presented involving two swedish companies, Axis Communications AB and Securitas ...
Jan Bosch