Sciweavers

1067 search results - page 153 / 214
» Research on Collaborative Information Sharing Systems
Sort
View
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 8 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
ICSE
2001
IEEE-ACM
15 years 8 months ago
An Empirical Study of Global Software Development: Distance and Speed
Global software development is rapidly becoming the norm for technology companies. Previous qualitative research suggests that multi-site development may increase development cycl...
James D. Herbsleb, Audris Mockus, Thomas A. Finhol...
CHI
2005
ACM
16 years 4 months ago
Who gets to know what when: configuring privacy permissions in an awareness application
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information ...
Sameer Patil, Jennifer Lai
CAISE
2003
Springer
15 years 9 months ago
Conceptual Modelling in Practice - Myth or Reality?
Conceptual modelling is thought (by academics at least) to be a key activity of Business Systems Analysis. For decades, comprehensive research has been conducted on related topics ...
Islay Davies, Peter Green, Michael Rosemann
FTDCS
1999
IEEE
15 years 8 months ago
roomComputers-Bridging Spaces
Cooperative Rooms (COR) is an interdisciplinary research and development program of GMD in collaboration with partners. Its objective is to design, develop and investigate future ...
Rolf Reinema, Knut A. Bahr, H.-J. Burkhardt, Marie...