Sciweavers

2386 search results - page 245 / 478
» Database Security 2000
Sort
View
DEXA
2000
Springer
109views Database» more  DEXA 2000»
15 years 3 months ago
Knowledge Decay in a Normalised Knowledge Base
Knowledge ‘decay’ is a measure of the degradation of knowledge integrity. In a unified knowledge representation, data, information and knowledge are all represented in a single...
John K. Debenham
DEXA
2000
Springer
84views Database» more  DEXA 2000»
15 years 3 months ago
Protocol for Taking Object-Based Checkpoints
Object-based checkpoints are consistent in the object-based system but may be inconsistent according to the traditional message-based definition. We present a protocol for taking ...
Katsuya Tanaka, Makoto Takizawa
ER
2000
Springer
136views Database» more  ER 2000»
15 years 2 months ago
Business Modelling Is Not Process Modelling
Innovative e-business projects start with a design of the e-business model. We often encounter the view, in research as well as industry practice, that an e-business model is simil...
Jaap Gordijn, Hans Akkermans, Hans van Vliet
95
Voted
ER
2000
Springer
126views Database» more  ER 2000»
15 years 2 months ago
Tool Support for Reuse of Analysis Patterns - A Case Study
: The size and complexity of modern information systems together with requirements for short development time increase the demands for reuse of already existing solutions. The idea...
Petia Wohed
ERCIMDL
2000
Springer
95views Education» more  ERCIMDL 2000»
15 years 2 months ago
A Digital Library of Native American Images
This paper summarizes the organizational and technical issues involved in creating a digital library of Native American images. Initial participants include a museum, an archives, ...
Elaine Peterson