Sciweavers

1049 search results - page 191 / 210
» Change Management in Large-Scale Enterprise Information Syst...
Sort
View
CCS
2009
ACM
15 years 10 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
15 years 3 months ago
The Role of Collective Mental Models in IOS Adoption: Opening the Black Box of Rationality in RFID Deployment
ABSTRACT. Risks associated with change in technology standards and uncertainty over the sharing of costs and benefits among trading partners impede interorganizational information ...
Frederick J. Riggins, Kelly T. Slaughter
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
15 years 2 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
78
Voted
DSS
2008
133views more  DSS 2008»
14 years 9 months ago
A semantic-expansion approach to personalized knowledge recommendation
The rapid propagation of the Internet and information technologies has changed the nature of many industries. Fast response and personalized recommendations have become natural tr...
Ting-Peng Liang, Yung-Fang Yang, Deng-Neng Chen, Y...
JBI
2008
14 years 9 months ago
The Field Representation Language
The complexity of quantitative biomedical models, and the rate at which they are published, is increasing to a point where managing the information has become all but impossible w...
Guy Tsafnat