Sciweavers

1757 search results - page 329 / 352
» Integrating and Extending JCSP
Sort
View
81
Voted
ACSAC
2002
IEEE
15 years 2 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
15 years 2 months ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
SCHULE
2001
Springer
15 years 2 months ago
Co-operative ICT-supported learning. A practical approach to design
Abstract: Education is changing, following changes in society. The focus is shifting from teaching towards learning. And Informatics, more particularly Information and Communicatio...
Tom J. van Weert
SIGMOD
2000
ACM
99views Database» more  SIGMOD 2000»
15 years 2 months ago
WSQ/DSQ: A Practical Approach for Combined Querying of Databases and the Web
We present WSQ/DSQ (pronounced “wisk-disk”), a new approach for combining the query facilities of traditional databases with existing search engines on the Web. WSQ, for Web-S...
Roy Goldman, Jennifer Widom
103
Voted
CIKM
2000
Springer
15 years 2 months ago
Dimensionality Reduction and Similarity Computation by Inner Product Approximations
—As databases increasingly integrate different types of information such as multimedia, spatial, time-series, and scientific data, it becomes necessary to support efficient retri...
Ömer Egecioglu, Hakan Ferhatosmanoglu