Sciweavers

7366 search results - page 1287 / 1474
» Development of the Information Systems Implementation Resear...
Sort
View
119
Voted
KES
2010
Springer
15 years 3 months ago
Extracting a Keyword Network of Flood Disaster Measures
For rapid and effective recovery from a flood disaster, an anti-disaster headquarters must not only assess the extent of damage, but also possess overall knowledge of the possibl...
Motoki Miura, Mitsuhiro Tokuda, Daiki Kuwahara
ECIS
2000
15 years 6 months ago
Enhancing Government Decision Making Through Knowledge Discovery from Data
- A major challenge facing management in developed countries is improving the performance of knowledge and service workers, i.e. the decision makers. In a developing country such a...
Herna L. Viktor, Heidi Arndt, Mauritz Oberholzer
ICSE
2011
IEEE-ACM
14 years 8 months ago
Miler: a toolset for exploring email data
Source code is the target and final outcome of software development. By focusing our research and analysis on source code only, we risk forgetting that software is the product of...
Alberto Bacchelli, Michele Lanza, Marco D'Ambros
WWW
2010
ACM
15 years 10 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
175
Voted
ICLP
2010
Springer
15 years 9 months ago
Bisimilarity in Concurrent Constraint Programming
Abstract. In this doctoral work we aim at developing a new approach to labelled semantics and equivalences for the Concurrent Constraint Programming (CCP) which will enable a broad...
Andres A. Aristizabal P.
« Prev « First page 1287 / 1474 Last » Next »