Sciweavers

607 search results - page 12 / 122
» Managing Constraint Violations in Administrative Information...
Sort
View
ECAI
2004
Springer
15 years 5 months ago
An Interactive System for Hiring and Managing Graduate Teaching Assistants
In this paper, we describe a system for managing the hiring and assigning of Graduate Teaching Assistants (GTAs) to academic tasks based on the GTAs qualifications, preferences, a...
Ryan Lim, Venkata Praveen Guddeti, Berthe Y. Choue...
APCCM
2007
15 years 1 months ago
A Framework for Managing the Evolution of Business Protocols in Web Services
Web services are loosely coupled software components that are published, discovered, and invoked across the Web. As the use of Web services grows, in order to correctly interact w...
Seung Hwan Ryu, Régis Saint-Paul, Boualem B...
ISTA
2007
15 years 1 months ago
Towards Information Management System for Licensing in Higher Education: An Ontology-Based Approach
Higher education licensing, i.e. the process of granting permissions to provide certain educational services, is an important process of public administration. Governmental bodies ...
Olga Cherednichenko, Dmytro Kuklenko, Sergiy Zlatk...
DEBU
2006
142views more  DEBU 2006»
14 years 11 months ago
Automated Storage Management with QoS Guarantee in Large-scale Virtualized Storage Systems
Storage virtualization in modern storage systems allows variability in the number of "physical" disks supporting a single "virtual" disk. In practice, IO workl...
Lin Qiao, Balakrishna R. Iyer, Divyakant Agrawal, ...
ISECS
2008
IEEE
15 years 6 months ago
Probability of Attack Based on System Vulnerability Life Cycle
—The proliferation of exploit codes greatly expedites attacks in cyber world. This research compiles important dates on vulnerability from various sources into five patterns of l...
Amontip Jumratjaroenvanit, Yunyong Teng-amnuay