Sciweavers

1138 search results - page 181 / 228
» Talking about concerns
Sort
View
104
Voted
CLEIEJ
1998
134views more  CLEIEJ 1998»
15 years 22 days ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
IRES
2002
85views more  IRES 2002»
15 years 21 days ago
The duality of knowledge
Knowledge Management (KM) is a field that has attracted much attention both in academic and practitioner circles. Most KM projects appear to be primarily concerned with knowledge ...
Paul Hildreth, Chris Kimble
IS
1998
15 years 21 days ago
Information Modeling in the Time of the Revolution
Information modeling is concerned with the construction of computer-based symbol structures which capture the meaning of information and organize it in ways that make it understan...
John Mylopoulos
128
Voted
JEI
2002
152views more  JEI 2002»
15 years 21 days ago
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique
The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digi...
Jessica J. Fridrich, Miroslav Goljan, Nasir Memon
120
Voted
JSS
2002
84views more  JSS 2002»
15 years 21 days ago
The impact of component architectures on interoperability
Component interoperability has become an important concern as companies migrate legacy systems, integrate COTS products, and assemble modules from disparate sources into a single ...
Leigh A. Davis, Rose F. Gamble, Jamie Payton