Sciweavers

7651 search results - page 1368 / 1531
» Information integration in the enterprise
Sort
View
IJIPT
2010
147views more  IJIPT 2010»
15 years 3 days ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
110
Voted
ISEM
2010
105views more  ISEM 2010»
15 years 2 days ago
A roadmap to adopting emerging technology in e-business: an empirical study
This study explores the firm’s readiness for developing emerging technology in e−business. By proposing a framework that captures technological, financial, and human capabilit...
Hsin-Lu Chang
IV
2010
IEEE
150views Visualization» more  IV 2010»
15 years 2 days ago
Supporting the Analytical Reasoning Process in Maritime Anomaly Detection: Evaluation and Experimental Design
Despite the growing number of systems providing visual analytic support for investigative analysis, few empirical studies include investigations on the analytical reasoning proces...
Maria Riveiro, Göran Falkman
IWPC
2010
IEEE
15 years 2 days ago
Understanding and Auditing the Licensing of Open Source Software Distributions
—Free and open source software (FOSS) is often distributed in binary packages, sometimes part of GNU/Linux operating system distributions, or part of products distributed/sold to...
Daniel M. Germán, Massimiliano Di Penta, Ju...
JAPLL
2010
179views more  JAPLL 2010»
15 years 2 days ago
Tractable query answering and rewriting under description logic constraints
Answering queries over an incomplete database w.r.t. a set of constraints is an important computational task with applications in fields as diverse as information integration and ...
Héctor Pérez-Urbina, Boris Motik, Ia...
« Prev « First page 1368 / 1531 Last » Next »