Sciweavers

18155 search results - page 3427 / 3631
» Point
Sort
View
138
Voted
ISSA
2004
15 years 5 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
132
Voted
ISSA
2004
15 years 5 months ago
The Protection Of Public Health Data - A Case Study
South Africa's health system consists of a large public sector and a smaller but fast-growing private sector. Health care varies from the most basic primary health care, offe...
S. Nkundlaa
160
Voted
JBI
2004
171views Bioinformatics» more  JBI 2004»
15 years 5 months ago
Consensus Clustering and Functional Interpretation of Gene Expression Data
Microarray analysis using clustering algorithms can suffer from lack of inter-method consistency in assigning related gene-expression profiles to clusters. Obtaining a consensus s...
Paul Kellam, Stephen Swift, Allan Tucker, Veronica...
124
Voted
ECIS
2003
15 years 5 months ago
A knowledge management application to support knowledge sharing in a design engineering community
The changing competitive landscape has brought new forces to bear on the manner in which new products are developed. These forces have put the creation and dissemination of knowle...
Brian Donnellan, Brian Fitzgerald
145
Voted
ECIS
2003
15 years 5 months ago
An empirical investigation of determinants to buy application services from ASPs
The Application Service Provider (ASP) is a pivotal point in the organization of information systems, since it brings up a new paradigm: “make, buy or rent”. An ASP is a compa...
Vincenzo Morabito
« Prev « First page 3427 / 3631 Last » Next »