Sciweavers

3524 search results - page 519 / 705
» Issues in Active Databases
Sort
View
AISM
2004
15 years 5 months ago
Approaches to IT Security in Small and Medium Enterprises
Organisations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent r...
Vassilis Dimopoulos, Steven Furnell, Murray Jennex...
CIC
2006
140views Communications» more  CIC 2006»
15 years 5 months ago
An Efficient Update Algorithm for Supporting Mobility in Structured P2P Systems
Structured peer to peer (P2P) systems organize a large number of nodes in well-defined structures and provide efficient and scalable search functionalities. They have been used as ...
Boxuan Gu, Hu Wang, Zongming Fei
CSREASAM
2006
15 years 5 months ago
A Visual Environment for Characterization of State Changes in Computer Systems
: Traditional state modeling techniques have several limitations. One of these is the reduced ability to model a large number of variables simultaneously. Another limitation is tha...
Gregory Vert, Sergiu M. Dascalu, Frederick C. Harr...
ECIS
2004
15 years 5 months ago
Requirements Engineering During Global Software Development: Some Impediments to the Requirements Engineering Process: a case st
Requirements engineering is not straightforward for any software development team. Developing software when team members are located in widely distributed geographic locations pos...
Jo Hanisch, Brian J. Corbitt
ECIS
2004
15 years 5 months ago
A conceptual framework of e-fraud control in an integrated supply chain
The integration of supply chains offers many benefits; yet, it may also render organisations more vulnerable to electronic fraud (e-fraud). E-fraud can drain on organisations'...
Lucian Vasiu