Sciweavers

6960 search results - page 994 / 1392
» Continuity Analysis of Programs
Sort
View
AISM
2004
15 years 6 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
AVI
2004
15 years 6 months ago
CircleView: a new approach for visualizing time-related multidimensional data sets
This paper introduces a new approach for visualizing multidimensional time-referenced data sets, called Circle View. The Circle View technique is a combination of hierarchical vis...
Daniel A. Keim, Jörn Schneidewind, Mike Sips
APVIS
2006
15 years 6 months ago
Visualization of a closed three-dimensional surface using portal-based rendering
The complexity and size of data is rapidly increasing in modern science, business and engineering. This has resulted in increasing demands for more sophisticated data analysis met...
Michael Bui, Nick Lowe, Masahiro Takatsuka
CSREASAM
2006
15 years 6 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
ECIS
2004
15 years 6 months ago
The overconfidence effect and IT professionals
Information Technology has become a core activity in most, if not all, corporations. Although IT managers continue to be under-represented in executive management, the very centra...
Glen L. Van der Vyver