In this paper we have introduced a methodology to rank the available products in the Internet market. These rankings are based on the customers’ own preferences and also on the ...
Manual knowledge acquisition is usually a costly and timeconsuming process. Automatic knowledge acquisition methods can then significantly support the knowledge engineer. In this ...
In this paper, we outline a conceptual framework for linking cyber security provisions to business processes. The framework is presented for use in analyzing the cost and performa...
Achieving goals of better integrated and responsive government services requires moving away from stand alone applications toward more comprehensive, integrated architectures. As ...
The costs of data loss and unavailability can be large, so businesses use many data protection techniques, such as remote mirroring, snapshots and backups, to guard against failur...
Shravan Gaonkar, Kimberly Keeton, Arif Merchant, W...