Sciweavers

6253 search results - page 1119 / 1251
» Use Case Modeling Guidelines
Sort
View
103
Voted
IJMI
2007
134views more  IJMI 2007»
15 years 3 months ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll
124
Voted
AIEDU
2005
68views more  AIEDU 2005»
15 years 3 months ago
Software Patterns in ITS Architectures
The paper discusses ITS architectures in terms of patterns that exist within them. The concept of patterns has received surprisingly little attention so far from researchers in the...
Vladan Devedzic, Andreas Harrer
IJON
2007
73views more  IJON 2007»
15 years 3 months ago
Improvement of spike coincidence detection with facilitating synapses
A realistic model of activity dependent dynamical synapses is used to study the conditions in which a postsynaptic neuron detects temporal coincidences of spikes arriving from N d...
Jorge F. Mejías, Joaquín J. Torres
128
Voted
TEC
2008
139views more  TEC 2008»
15 years 3 months ago
Genetic Programming Approaches for Solving Elliptic Partial Differential Equations
In this paper, we propose a technique based on genetic programming (GP) for meshfree solution of elliptic partial differential equations. We employ the least-squares collocation pr...
Andras Sobester, Prasanth B. Nair, Andy J. Keane
107
Voted
JCP
2007
132views more  JCP 2007»
15 years 3 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
« Prev « First page 1119 / 1251 Last » Next »