Sciweavers

751 search results - page 5 / 151
» How to Make Business with Computer Vision Technology
Sort
View
CORR
2006
Springer
133views Education» more  CORR 2006»
14 years 9 months ago
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
Abstract. In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requiremen...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
IEEESCC
2006
IEEE
15 years 3 months ago
Applying Distributed Business Rules - The VIDRE Approach
Today’s business processes are not static, they need to be adapted frequently to reflect changing business requirements. Several business process languages such as WS-BPEL have...
Florian Rosenberg, Christoph Nagl, Schahram Dustda...
CCGRID
2010
IEEE
14 years 10 months ago
A Categorisation of Cloud Computing Business Models
- This paper reviews current cloud computing business models and presents proposals on how organisations can achieve sustainability by adopting appropriate models. We classify clou...
Victor Chang, David A. Bacigalupo, Gary Wills, Dav...
CVPR
2000
IEEE
15 years 11 months ago
Learning in Gibbsian Fields: How Accurate and How Fast Can It Be?
?Gibbsian fields or Markov random fields are widely used in Bayesian image analysis, but learning Gibbs models is computationally expensive. The computational complexity is pronoun...
Song Chun Zhu, Xiuwen Liu
IC
2010
14 years 7 months ago
Cloud Computing - The Next Revolution in Information Technology
: Computing is being transformed to a model consisting of services that are commoditised and delivered in a manner similar to utilities such as water, electricity, gas, and telepho...
Rajkumar Buyya