Sciweavers

1022 search results - page 161 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
ICEIS
2007
IEEE
14 years 2 months ago
Performing Business Process Redesign with Best Practices: An Evolutionary Approach
Although extensive literature on BPR is available, there is still a lack of concrete guidance on actually changing processes for the better. In this paper we propose and detail out...
Mariska Netjes, Selma Limam Mansar, Hajo A. Reijer...
MM
2004
ACM
174views Multimedia» more  MM 2004»
14 years 1 months ago
Speech, ink, and slides: the interaction of content channels
In this paper, we report on an empirical exploration of digital ink and speech usage in lecture presentation. We studied the video archives of five Master’s level Computer Scien...
Richard J. Anderson, Crystal Hoyer, Craig Prince, ...
ICS
2000
Tsinghua U.
13 years 11 months ago
A simulation-based study of scheduling mechanisms for a dynamic cluster environment
Scheduling of processes onto processors of a parallel machine has always been an important and challenging area of research. The issue becomes even more crucial and di cult as we ...
Yanyong Zhang, Anand Sivasubramaniam, José ...
CODES
2005
IEEE
14 years 1 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
CHI
2008
ACM
14 years 8 months ago
OpenMessenger: gradual initiation of interaction for distributed workgroups
The initiation of interaction in face-to-face environments is a gradual process, and takes place in a rich information landscape of awareness, attention, and social signals. One o...
Jeremy P. Birnholtz, Carl Gutwin, Gonzalo Ramos, M...