Sciweavers

30 search results - page 6 / 6
» Successfully Adopting IT for Social Welfare Program Manageme...
Sort
View
ACSAC
2009
IEEE
13 years 11 months ago
The Good, the Bad, And the Ugly: Stepping on the Security Scale
: Metrics are both fashionable and timely: many regulations that affect cybersecurity rely upon metrics – albeit, of the checklist variety in many cases – to ascertain complian...
Mary Ann Davidson
SIGUCCS
2003
ACM
13 years 10 months ago
Instituting and advocating technology training and sharing of ideas for online courseware
How can you invite and encourage faculty to share their knowledge and ideas about courseware? A successful faculty technology training program promotes interdepartmental collabora...
Donna Patterson
WWW
2001
ACM
14 years 5 months ago
Enabling full service surrogates using the portable channel representation
The simplicity of the basic client/server model of Web services led quickly to its widespread adoption, but also to scalability and performance problems. The technological respons...
Micah Beck, Terry Moore, Leif Abrahamsson, Christo...
COMPSAC
2002
IEEE
13 years 10 months ago
A Graphically Based Language for Constructing, Executing and Analysing Models of Software Systems
With computer systems becoming ever larger and more complex, the cost and effort associated with their construction is increasing and the systems are now sufficiently complex that...
Robert John Walters
ICDAR
2011
IEEE
12 years 4 months ago
Language-Independent Text Lines Extraction Using Seam Carving
Abstract—In this paper, we present a novel languageindependent algorithm for extracting text-lines from handwritten document images. Our algorithm is based on the seam carving ap...
Raid Saabni, Jihad El-Sana