Sciweavers

1889 search results - page 42 / 378
» Evaluating cost taxonomies for information systems managemen...
Sort
View
CLEIEJ
2010
14 years 7 months ago
Empirical Validation of Component-based Software Systems Generation and Evaluation Approaches
Component-based software development needs to formalize a process of generation, evaluation and selection of Composite COTS-based Software Systems (CCSS), enabling software archit...
Victor Sagredo, Carlos Becerra, Gonzalo Valdes
EGOV
2006
Springer
15 years 1 months ago
Evaluation of E-Government Systems: Project Assessment vs Development Assessment
Abstract. Most reported literature on evaluation of e-government systems tend to focus on narrow aspects of project design and implementation. The larger context of development and...
Rahul De'
PAKM
1998
14 years 11 months ago
Knowledge Management: A Text Mining Approach
Knowledge Discovery in Databases (KDD), also known as data mining, focuses on the computerized exploration of large amounts of data and on the discovery of interesting patterns wi...
Ronen Feldman, Moshe Fresko, Haym Hirsh, Yonatan A...
ATAL
2006
Springer
15 years 1 months ago
Agent-community based peer-to-peer information retrieval: an evaluation
The Agent-Community-based Peer-to-Peer Information Retrieval (ACP2P) method uses agent communities to manage and look up information of interest to users. An agent works as a dele...
Tsunenori Mine, Akihiro Kogo, Makoto Amamiya
HICSS
2009
IEEE
213views Biometrics» more  HICSS 2009»
15 years 4 months ago
AURUM: A Framework for Information Security Risk Management
—As companies are increasingly exposed to a variety of information security threats, they are permanently forced to pay attention to security issues. Risk management provides an ...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer