Sciweavers

572 search results - page 109 / 115
» Reputation Management Survey
Sort
View
STORAGESS
2005
ACM
14 years 1 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
SIGUCCS
2003
ACM
14 years 22 days ago
Deep in benchmarking: using industry standards to assess a training program
At the University of Missouri – Columbia’s Information and Access Technology (IAT) Services, InfoTech Training compares the results of their IT training program with similar t...
Joleen Pfefer
ISESE
2002
IEEE
14 years 13 days ago
The Appropriateness of Gutman's Means-End Chain Model in Software Evaluation
The primary objective of this paper was to examine the extent to which Gutman’s Means-End Chain Model can be used to describe the influences given to the choice of characteristi...
Bernard Wong
SIGUCCS
2000
ACM
13 years 12 months ago
Putting Help Where the User Is - A Desktop Computer Support Strategy
As the personal computer becomes a more integral part of the faculty member’s job, the increasing level of day-to-day computer support - often without increases in full-time sta...
Cheryl Stahler
DBPL
1989
Springer
165views Database» more  DBPL 1989»
13 years 11 months ago
Support for Data-Intensive Applications: Conceptual Design and Software Development
In the process of developing an Information System, one passes through stages that include requirements gathering, design specification, and software implementation. The purpose ...
Alexander Borgida, John Mylopoulos, Joachim W. Sch...