Sciweavers

5723 search results - page 999 / 1145
» Network Management
Sort
View
CRITIS
2007
15 years 5 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
BIS
2009
168views Business» more  BIS 2009»
15 years 5 months ago
Defining Adaptation Constraints for Business Process Variants
Abstract. In current dynamic business environment, it has been argued that certain characteristics of ad-hocism in business processes are desirable. Such business processes typical...
Ruopeng Lu, Shazia Wasim Sadiq, Guido Governatori,...
116
Voted
WMPI
2004
ACM
15 years 9 months ago
Evaluating kilo-instruction multiprocessors
The ever increasing gap in processor and memory speeds has a very negative impact on performance. One possible solution to overcome this problem is the Kilo-instruction processor. ...
Marco Galluzzi, Ramón Beivide, Valentin Pue...
EEE
2004
IEEE
15 years 7 months ago
e-Transformation Technologies: Case Studies and the Road Ahead - A Value Chain Perspective
e-Transformation technologies, for the past few years, have been evolving towards the goal of information integration and system interoperability. While there is no doubt that int...
William Kwok-Wai Cheung
138
Voted
DGO
2008
173views Education» more  DGO 2008»
15 years 5 months ago
The Deliberative E-Rulemaking project (DeER): improving federal agency rulemaking via natural language processing and citizen di
Many scholars believe that electronic rulemaking has great but largely untapped potential to expand the public's democratic input and improve federal agency regulatory rules....
Peter Muhlberger, Nick Webb, Jennifer Stromer-Gall...