Sciweavers

199 search results - page 24 / 40
» Proactive Knowledge Delivery for Enterprise Knowledge Manage...
Sort
View
ISF
2008
114views more  ISF 2008»
14 years 9 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
DGO
2011
237views Education» more  DGO 2011»
13 years 9 months ago
Modeling digital preservation capabilities in enterprise architecture
The rising awareness of the challenges of preserving information over the long term has led to a wealth of initiatives developing economic models, methods, tools, systems, guideli...
Christoph Becker, Gonçalo Antunes, Jos&eacu...
BIS
2006
132views Business» more  BIS 2006»
14 years 11 months ago
Utilizing Successful Work Practice for Business Process Evolution
Business process management (BPM) has emerged as a dominant technology in current enterprise systems and business solutions. However, business processes are always evolving in cur...
Ruopeng Lu, Shazia Wasim Sadiq, Guido Governatori
GLOBECOM
2007
IEEE
15 years 4 months ago
Network-Calculus-Based Analysis of Power Management in Video Sensor Networks
— This paper considers two important issues for video sensor network, (1) timely delivery of captured video stream and (2) energy-efficient network design. Based on network calc...
Yanchuan Cao, Yuan Xue, Yi Cui
SACMAT
2005
ACM
15 years 3 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens