Sciweavers

3737 search results - page 664 / 748
» Knowledge Management and Promises
Sort
View
138
Voted
SIS
2008
15 years 5 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
139
Voted
NETWORKING
2007
15 years 5 months ago
On-Line Predictive Load Shedding for Network Monitoring
Building robust network monitoring applications is hard given the unpredictable nature of network traffic. Complex analysis on streaming network data usually leads to overload situ...
Pere Barlet-Ros, Diego Amores-López, Gianlu...
134
Voted
ACSW
2006
15 years 5 months ago
Toward building grid applications in bioinformatics
In silico bioinformatics experiments involve integration of and access to computational tools and biological databases. The emerging grid computing technologies enable bioinformat...
Xiujun Gong, Kensuke Nakamura, Kei Yura, Nobuhiro ...
124
Voted
ASC
2006
15 years 5 months ago
A WAM implementation for flexible query answering
In [7] Maria I. Sessa extended the SLD resolution principle with the ability of performing approximate reasoning and flexible query answering. The operational mechanism of similar...
Pascual Julián Iranzo, Clemente Rubio-Manza...
123
Voted
ECIS
2004
15 years 5 months ago
IS Process Innovation Unlearning in Organisations
This paper identifies mechanisms that affected over 200 Information System Process Innovation (ISPI) unlearning decisions in three organisational environments over a period that s...
Erja Mustonen-Ollila