Sciweavers

28 search results - page 5 / 6
» Approaches to IT Security in Small and Medium Enterprises
Sort
View
OR
2011
Springer
13 years 6 days ago
Modeling an e-government observatory for rural SMEs using UML with RUP
Developing Web-based systems for agriculture and rural development requires the collaboration of experts from different scientific fields and backgrounds. Thus, it is crucial to ...
Sotiris Karetsos, Nikos Manouselis, Constantina Co...
IV
2002
IEEE
65views Visualization» more  IV 2002»
13 years 10 months ago
Visual Information Retrieval with the SuperTable + Scatterplot
We present a new visualization approach for metadata combining different visualizations into a so-called SuperTable accompanied by a Scatterplot. The goal is to improve user exper...
Peter Klein, Frank Müller, Harald Reiterer, M...
DOCENG
2003
ACM
13 years 10 months ago
Context representation, transformation and comparison for ad hoc product data exchange
Product data exchange is the precondition of business interoperation between Web-based firms. However, millions of small and medium sized enterprises (SMEs) encode their Web produ...
Jingzhi Guo, Chengzheng Sun
VLDB
2007
ACM
119views Database» more  VLDB 2007»
13 years 11 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
HCW
2000
IEEE
13 years 9 months ago
Evaluation of PAMS' Adaptive Management Services
Management of large-scale parallel and distributed applications is an extremely complex task due to factors such as centralized management architectures, lack of coordination and ...
Yoonhee Kim, Salim Hariri, Muhamad Djunaedi