Sciweavers

2978 search results - page 520 / 596
» A product-based information management approach
Sort
View
ICC
2009
IEEE
132views Communications» more  ICC 2009»
15 years 6 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
BPM
2009
Springer
134views Business» more  BPM 2009»
15 years 6 months ago
Business Process-Based Resource Importance Determination
Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
Stefan Fenz, Andreas Ekelhart, Thomas Neubauer
KIVS
2009
Springer
15 years 6 months ago
Query Processing and System-Level Support for Runtime-Adaptive Sensor Networks
We present an integrated approach for supporting in-network sensor data processing in dynamic and heterogeneous sensor networks. The concept relies on data stream processing techni...
Falko Dressler, Rüdiger Kapitza, Michael Daum...
COMPSAC
2008
IEEE
15 years 6 months ago
Implicit Social Network Model for Predicting and Tracking the Location of Faults
— In software testing and maintenance activities, the observed faults and bugs are reported in bug report managing systems (BRMS) for further analysis and repair. According to th...
Ing-Xiang Chen, Cheng-Zen Yang, Ting-Kun Lu, Hojun...
ICPR
2008
IEEE
15 years 6 months ago
Application of the wrapper framework for image object detection
Tools for automatic image understanding for managing operator workloads are essential. One common task for image analysts is the scanning large collections of real-time images loo...
Michael Farmer