Sciweavers

2978 search results - page 552 / 596
» Operations Research
Sort
View
EUROSYS
2010
ACM
15 years 2 months ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
COOPIS
2002
IEEE
15 years 2 months ago
An Evolvable Framework for Perceptual Collaborative Applications
The Neem Platform is a research test bed for Project Neem, concerned with the development of socially and culturally aware collaborative systems in a wide range of domains, through...
Paulo Barthelmess, Clarence A. Ellis, The Neem Pla...
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
15 years 2 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
HICSS
2002
IEEE
154views Biometrics» more  HICSS 2002»
15 years 2 months ago
Designing Effective Incentive-Oriented Outsourcing Contracts for ERP Systems
Information systems outsourcing has been viewed as an attractive option by many senior managers generally because of the belief that IS outsourcing vendors can achieve economies o...
Kweku-Muata Bryson, William E. Sullivan
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
15 years 2 months ago
A Set Theory Based Approach on Applying Domain Semantics to XML Structures
As XML is gathering more and more importance in the field of data interchange in distributed business to business (B2B) applications, it is increasingly important to provide a for...
Wolfgang Schuetzelhofer, Karl M. Göschka