Sciweavers

2550 search results - page 440 / 510
» Enterprise Content Management
Sort
View
WICON
2008
14 years 11 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
CSREASAM
2004
14 years 11 months ago
A Unified Framework for Mobile Device Security
: Present-day handheld devices, such as PDAs, are a useful blend of hardware and software oriented toward the mobile workforce. While they provide the capability to review document...
Wayne A. Jansen, Serban I. Gavrila, Vlad Korolev
I3E
2004
145views Business» more  I3E 2004»
14 years 11 months ago
Evolution of Service Processes by Rule Based Transformation
: The notion of service is closely coupled with the notion of process in general and of workflow in particular. Processes capture the coordination logic for the various resources i...
Christian Zirpins, Giacomo Piccinelli
IADIS
2004
14 years 11 months ago
Electronic case studies: a problem-based learning approach
E-Cases is an innovative approach to management development. Traditional case studies typically describe a decision or a problem in a real-life setting. E-Cases encourage students...
Philip M. Drinkwater, Christopher P. Holland, K. N...
IADIS
2004
14 years 11 months ago
A conceptual modeling of multimedia documents
Our research works are interested in the identification and the representation of the semantic structures of multimedia documents. The semantic structure of a multimedia document ...
Mohamed Mbarki, Chantal Soulé-Dupuy