Sciweavers

1713 search results - page 195 / 343
» Analysis of Procedure Splitability
Sort
View
118
Voted
AISM
2004
15 years 2 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
104
Voted
CSREASAM
2006
15 years 2 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
109
Voted
AIPS
2003
15 years 2 months ago
A Framework for Planning in Continuous-time Stochastic Domains
We propose a framework for policy generation in continuoustime stochastic domains with concurrent actions and events of uncertain duration. We make no assumptions regarding the co...
Håkan L. S. Younes, David J. Musliner, Reid ...
90
Voted
FLAIRS
2001
15 years 2 months ago
Combining Concept Mapping with CBR: Towards Experience-Based Support for Knowledge Modeling
Knowledge management depends on effective methods for capturing knowledge in useful forms and making it available when needed. Electronic concept maps provide a promising represen...
Alberto J. Cañas, David B. Leake, Ana Gabri...
84
Voted
ECIS
2003
15 years 2 months ago
The ERP system as a part of an organization's administrative paradox
This paper argues that ERP systems take the part of an organization’s administrative paradox. An administrative paradox is two sides of the same coin when coordinating organizat...
Ulf Melin