Sciweavers

164 search results - page 11 / 33
» How to Model Operational Risk If You Must
Sort
View
70
Voted
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
15 years 3 months ago
Balancing Safety Against Performance: Tradeoffs in Internet Security
All Internet-accessible computing systems are currently faced with incessant threats ranging from simple scriptkiddies to highly sophisticated criminal enterprises. In response to...
Vu A. Ha, David J. Musliner
BTW
2007
Springer
114views Database» more  BTW 2007»
15 years 4 months ago
Transformation of Models in(to) a Generic Metamodel
: Model Management aims at developing new technologies and mechanisms to support the integration, evolution and matching of models. Such tasks are to be performed by means of a set...
David Kensche, Christoph Quix
SIGSAND
2008
14 years 11 months ago
Design of Fractal-Based Systems Within MDA: Platform Independent Modelling
: Today's businesses must continuously adapt to changing external environment in accelerated time frames. This requires businesses to decrease costs and time of the very proce...
Erika Asnina, Janis Osis, Marite Kirikova
WWW
2009
ACM
15 years 10 months ago
What makes conversations interesting?: themes, participants and consequences of conversations in online social media
Rich media social networks promote not only creation and consumption of media, but also communication about the posted media item. What causes a conversation to be interesting, th...
Ajita John, Dorée D. Seligmann, Hari Sundar...
TES
2001
Springer
15 years 2 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...