Diane Crawford
pág. 5
págs. 9-10
Resolving the Program-Verification Debate
C.W. Neville, Ann Sobel, Rodney M. Bates, Paul E. McKenney, Michael Clarkson, James H. Fetzer, Todd Palino
págs. 11-15
Cyberspace Across Sub-Saharan Africa
Mike Jensen, Victor Mbarika, Peter Meso
págs. 17-21
Teaching Reviewing to Graduate Students
Scott J. Baxter, Jens Palsberg
págs. 22-24
Felipe Castel
págs. 25-26
John R. White
págs. 27-30
Multicast Over Wireless Networks
Upkar Varshney
págs. 31-67
págs. 39-44
The Value of Seller Trustworthiness in C2C Online Markets
Troy J. Strader, Sridhar N. Ramaswami
págs. 45-49
Emergent Patterns of Integration in Electronic Channel Systems
Christoph Schlueter-Langdon, Michael J. Shaw
págs. 50-55
Strategic IT Application in Health Care
Joseph Tan, Wullianallur Raghupathi
págs. 56-61
Issues and Challenges in Ubiquitous Computing
Kalle Lyytinen
págs. 62-65
págs. 67-73
Group Dynamics and Ubiquitous Computing
Jonathan Grudin
págs. 74-78
New Frontiers of Application Design
Daniel P. Siewiorek
págs. 79-82
The Future of Business Services in the Age of Ubiquitous Computing
Andrew Fano, Anatole Gershman
págs. 83-87
The Relevance of Social Issues in Ubiquitous Computing Environments
Leonard M. Jessup, Daniel Robey
págs. 88-91
Software Infrastructure and Design Challenges for Ubiquitous Computing Applications
Abraham Bernstein, Guruduth Banavar
págs. 92-96
Component-based Data Mining Frameworks
Fernando Berzal, Ignacio Blanco, Nicolás Marín Ruiz, Juan Carlos Cubero Talavera
págs. 97-100
Why Security Standards Sometimes Fail
Avishai Wool
pág. 144
© 2001-2025 Fundación Dialnet · Todos los derechos reservados