Sciweavers

1429 search results - page 90 / 286
» An Overview of the Annex System
Sort
View
121
Voted
BCSHCI
2009
14 years 10 months ago
Digital parenting: designing children's safety
In this paper, I describe an ethnographic study of children and parents looking at issues of domestic privacy and security. I will provide an overview of parental rules and strate...
Jennifer A. Rode
GECCO
2003
Springer
138views Optimization» more  GECCO 2003»
15 years 6 months ago
Emergence of Collective Behavior in Evolving Populations of Flying Agents
We demonstrate the emergence of collective behavior in two evolutionary computation systems, one an evolutionary extension of a classic (highly constrained) flocking algorithm and...
Lee Spector, Jon Klein, Chris Perry, Mark Feinstei...
124
Voted
EKNOW
2009
14 years 10 months ago
Process Diagnostics: A Method Based on Process Mining
As organizations change, their information systems can evolve from simple systems to complex systems, which are hard to understand, and therefore hard to maintain or extend. Proces...
Melike Bozkaya, Joost Gabriels, Jan Martijn E. M. ...
216
Voted

Lecture Notes
404views
16 years 11 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
EUROMICRO
1999
IEEE
15 years 5 months ago
Processing Requirements by Software Configuration Management
Short development life cycles, the importance of timeto-market and fast changes in technology influence the requirements engineering process. Requirements are exposed to changes d...
Ivica Crnkovic, Peter J. Funk, Magnus Larsson