Sciweavers

3311 search results - page 590 / 663
» Deductive Object Programming
Sort
View
ISSA
2004
14 years 11 months ago
A General Methodology For The Development Of An Effective Information Security Policy
In today's hi-tech world, conventional physical security methods are simply insufficient for the protection of an organisation's information assets. This is because of t...
Arvish Ramdeyal
ODRL
2004
14 years 11 months ago
A Pervasive Application Rights Management Architecture (PARMA) based on ODRL
Software license management is currently expanding from its traditional desktop environment into the mobile application space, but software vendors are still applying old licensing...
Dominik Dahlem, Ivana Dusparic, Jim Dowling
ICIS
2003
14 years 11 months ago
The Economics of Telecommuting: Theory and Evidence
While there has been considerable research on the effect of telecommuting on worker’s productivity and quality of work life, there is considerably less work on the managerial pr...
Guodong Gao, Lorin M. Hitt
TREC
2001
14 years 11 months ago
Oracle at TREC 10: Filtering and Question-Answering
: Oracle's objective in TREC-10 was to study the behavior of Oracle information retrieval in previously unexplored application areas. The software used was Oracle9i Text[1], O...
Shamin Alpha, Paul Dixon, Ciya Liao, Changwen Yang
SOQUA
2004
14 years 11 months ago
Measuring Component Performance Using A Systematic Approach and Environment
: As more third-party software components are available in the commercial market, more people begin to use the component-based software engineering approach to developing component...
Jerry Gao, Chandra S. Ravi, Raquel Espinoza