Sciweavers

1411 search results - page 156 / 283
» Case Studies of an Insider Framework
Sort
View
101
Voted
AISM
2004
15 years 17 days ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
AUTOMATICA
2006
152views more  AUTOMATICA 2006»
14 years 11 months ago
Simulation-based optimization of process control policies for inventory management in supply chains
A simulation-based optimization framework involving simultaneous perturbation stochastic approximation (SPSA) is presented as a means for optimally specifying parameters of intern...
Jay D. Schwartz, Wenlin Wang, Daniel E. Rivera
ICEIS
2009
IEEE
14 years 9 months ago
Mining Patterns in the Presence of Domain Knowledge
One of the main difficulties of pattern mining is to deal with items of different nature in the same itemset, which can occur in any domain except basket analysis. Indeed, if we co...
Cláudia Antunes
OOPSLA
2000
Springer
15 years 2 months ago
Finding refactorings via change metrics
Reverse engineering is the process of uncovering the design and the design rationale from a functioning software system. Reverse engineering is an integral part of any successful ...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...
TSMC
2011
289views more  TSMC 2011»
14 years 5 months ago
Formalizing Functional Flow Block Diagrams Using Process Algebra and Metamodels
Abstract—Functional flow block diagrams (FFBDs) are a traditional tool of systems engineering and remain popular in some systems engineering domains. However, their lack of form...
Allan I. McInnes, Brandon K. Eames, Russell J. Gro...