Sciweavers

3584 search results - page 175 / 717
» Design considerations for a network of information
Sort
View
76
Voted
WWW
2008
ACM
15 years 11 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
SENSYS
2005
ACM
15 years 4 months ago
CenWits: a sensor-based loosely coupled search and rescue system using witnesses
This paper describes the design, implementation and evaluation of a search and rescue system called CenWits. CenWits uses several small, commonly-available RF-based sensors, and a...
Jyh-How Huang, Saqib Amjad, Shivakant Mishra
WWW
2005
ACM
15 years 11 months ago
G-ToPSS: fast filtering of graph-based metadata
RDF is increasingly being used to represent metadata. RDF Site Summary (RSS) is an application of RDF on the Web that has considerably grown in popularity. However, the way RSS sy...
Milenko Petrovic, Haifeng Liu, Hans-Arno Jacobsen
AIEDAM
2006
89views more  AIEDAM 2006»
14 years 10 months ago
Design space exploration revisited
Design involves reasoning about descriptions of design artefacts, reasoning about design requirements and reasoning about design process objectives (such as keeping to deadlines an...
Pieter H. G. van Langen, Frances M. T. Brazier
80
Voted
ER
2007
Springer
125views Database» more  ER 2007»
15 years 4 months ago
On the Correlation between Process Model Metrics and Errors
Business process models play an important role for the management, design, and improvement of process organizations and process-aware information systems. Despite the extensive ap...
Jan Mendling, Gustaf Neumann, Wil M. P. van der Aa...