نتایج جستجو برای: personal computing

تعداد نتایج: 562810  

Journal: :MIS Quarterly 1997
Magid Igbaria Nancy Zinatelli Paul B. Cragg Angèle L. M. Cavaye

This study draws upon the technology acceptance model as the theoretical basis and empirical findings for a pragmatic explanation of key factors affecting personal computing acceptance in small firms. The study uses results from a survey of 358 users in small firms in New Zealand to test a structural model examining the hypothesized relationships among the following constructs: intraorganizatio...

2004
John Light

This paper is a survey of user risks associated with the Personal Server concept. The Personal Server concept is used as a surrogate for future mobile devices. The risks are threats involving security, privacy and trust. An overview of the concept is provided, followed by descriptions of three usage models: mobile storage, application server, and beacon receiver. Each usage model description in...

2005
Robert F. Erbacher Menashe Garber

Techniques in conjunction with an implemented environment are described for the visual monitoring and analysis of port activity. The goal is to provide the ability to detect anomalous or mischievous activity on an individual system basis. Such capabilities would allow individual users of systems to garner greater insight into the network activity of their system than is currently provided by ty...

2008
Michael Crotty Nick K. Taylor M. Howard Williams Korbinian Frank Ioanna Roussaki Mark Roddy

Ubiquitous computing (or ambient intelligence) has been the subject of research in the mobile telecommunications field for many years. Developments such as the Internet of Services and Grid computing have complemented and strengthened this work. The ubiquitous computing paradigm integrates information processing into the objects that surround us in our environment. One particular focus has been...

Journal: :CoRR 2014
Ricardo Queiroz de Araujo Fernandes Edward Hermann Haeusler Luiz Carlos Pereira

We present a embedding of Lewis Deontic logics in PUC-Logic. We achieve this by representing the very basic CO logic and showing its relative completeness.

2004
Michael A. Kozuch

Internet Suspend/Resume (ISR) is an exciting new model for managing client machines in the enterprise. ISR provides the administrative benefits of central management without sacrificing the performance benefits of thick-client, personal computing. This capability is made possible through the novel combination of two wellunderstood technologies: virtual machines and distributed storage managemen...

2012
Melanie Swan

The current era of internet-facilitated bigger data, better tools, and collective intelligence community computing is accelerating advances in many areas ranging from artificial intelligence to knowledge generation to public health. In the health sector, data volumes are growing with genomic, phenotypic, microbiomic, metabolomic, self-tracking, and other data streams. Simultaneously, tools are ...

2000
Paul J.M. Havinga

Recent advances in wireless networking technology and the exponential development of semiconductor technology have engendered a new paradigm of computing, called personal mobile computing or ubiquitous computing. This offers a vision of the future with a much richer and more exciting set of architecture research challenges than extrapolations of the current desktop architectures. In particular,...

Journal: :Knowledge Eng. Review 2006
Roy Sterritt David W. Bustard

Like the autonomic responses in the human body, autonomic computing systems recognise their own health problems and where possible respond to correct them. Failing that, external help is required. The purpose of this paper is to consider how autonomic systems might be structured to facilitate health monitoring. The approach uses a 'pulse' monitor for each autonomic element, which provides a ref...

2005
Robert F. Erbacher Menashe Garber

Techniques in conjunction with an implemented environment are described for the visual monitoring and analysis of port activity. The goal is to provide the ability to detect anomalous or mischievous activity on an individual system basis. Such capabilities would allow individual users of systems to garner greater insight into the network activity of their system than is currently provided by ty...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید