Sciweavers

26602 search results - page 5256 / 5321
» A New Imaging Model
Sort
View
90
Voted
AAAI
2006
15 years 2 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
AIM
2006
15 years 2 months ago
Observing the use of BPM tools: A step towards flexibility
: The development of the tools of Business Process Management (BPM) arises from the spread of the notion of process in the management universe. The application of BPM to strategic ...
Joseph Heili, Jean-Mathias Heraud, Laure France
95
Voted
CSREASAM
2006
15 years 2 months ago
Flexible Cryptographic Component Design for Secure Web Applications
- Although Internet serves many contents and services, it has serious problems of security: the invasion of privacy, hacking and etc. To prevent these problems, two implementations...
Tae Ho Kim, Jong Jin Kim, Chang Hoon Kim, Chun Pyo...
ECIS
2004
15 years 2 months ago
Beyond Knowledge Management - Introducing a framework for Learning Management Systems
In the knowledge economy, a firm's intellectual capital represents the only sustainable source of competitive advantage. Intellectual capital manifests itself, predominantly,...
Audrey Dunne, Tom Butler
162
Voted
DCEIS
2006
15 years 2 months ago
Semantic Coherence in Software Engineering
During software engineering processes lots of artifacts are produced to document the development of a concrete software. For artifacts which are related with respect to their meani...
Michael Skusa
« Prev « First page 5256 / 5321 Last » Next »