Sciweavers

708 search results - page 75 / 142
» Information system life cycle and management roles
Sort
View
SACMAT
2003
ACM
15 years 5 months ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
CIKM
2010
Springer
14 years 10 months ago
Building a semantic representation for personal information
A typical collection of personal information contains many documents and mentions many concepts (e.g., person names, events, etc.). In this environment, associative browsing betwe...
Jinyoung Kim, Anton Bakalov, David A. Smith, W. Br...
SIGUCCS
2000
ACM
15 years 3 months ago
Approaches to Computer Lab Management: Lockdown vs. Freedom
Basic approaches to computer lab management range along a spectrum from total lockdown of lab computers to total freedom. Total lockdown, which can be implemented with system perm...
Christopher Jones, Yasemin Tunc, Deborah Cherry
COMAD
2008
15 years 1 months ago
Modeling Uncertain and Imprecise Information in Process Modeling with UML
In designing and developing large complex products, people use models to describe and organize interrelated elements in both product systems (architecture, use cases, constraints....
Xiao Jing, Pierre Pinel, Lei Pi, Vincent Aranega, ...
ICDM
2008
IEEE
142views Data Mining» more  ICDM 2008»
15 years 6 months ago
Clustering Events on Streams Using Complex Context Information
Monitoring applications play an increasingly important role in many domains. They detect events in monitored systems and take actions such as invoke a program or notify an adminis...
YongChul Kwon, Wing Yee Lee, Magdalena Balazinska,...