Sciweavers

356 search results - page 35 / 72
» The human infrastructure of cyberinfrastructure
Sort
View
COMPUTER
2008
66views more  COMPUTER 2008»
13 years 8 months ago
Into the Wild: Low-Cost Ubicomp Prototype Testing
ions and techniques such as activity models, storyboards, and programming by demonstration (Y. Li and J. Landay, "Activity-Based Prototyping of Ubicomp Applications for Long-L...
Yang Li, James A. Landay
IUI
2006
ACM
14 years 2 months ago
Linking messages and form requests
Large organizations with sophisticated infrastructures have large form-based systems that manage the interaction between the user community and the infrastructure. In many cases, ...
Anthony Tomasic, John Zimmerman, Isaac Simmons
CSE
2009
IEEE
14 years 2 months ago
Ceremonies Formal Analysis in PKI's Context
—Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We ta...
Jean Everson Martina, Túlio Cicero Salvaro ...
ICECCS
2008
IEEE
183views Hardware» more  ICECCS 2008»
14 years 2 months ago
Ambient Intelligence Applications: Introducing the Campus Framework
A challenge for pervasive computing is the seamless integration of computer support with users’ activities in a very dynamic setting, with deep human and resource mobility. Port...
Amal El Fallah-Seghrouchni, Karin Breitman, Nicola...
BPM
2007
Springer
265views Business» more  BPM 2007»
14 years 2 months ago
BPM on Top of SOA: Experiences from the Financial Industry
Abstract. Service Oriented Architecture (SOA) forms an ideal infrastructure for Business Process Management as applications are invoked using standard interfaces and protocols. Aut...
Steen Brahe