Sciweavers

159 search results - page 24 / 32
» assets 2008
Sort
View
ISSA
2008
14 years 11 months ago
The Information Security of a Bluetooth-Enabled Handheld Device
Bluetooth connectivity allows workers to access information anywhere, including both personal and corporate information. Software and applications have been specifically developed...
Frankie Tvrz, Marijke Coetzee
LREC
2008
115views Education» more  LREC 2008»
14 years 11 months ago
Extracting Lexical Semantic Knowledge from Wikipedia and Wiktionary
Recently, collaboratively constructed resources such as Wikipedia and Wiktionary have been discovered as valuable lexical semantic knowledge bases with a high potential in diverse...
Torsten Zesch, Christof Müller, Iryna Gurevyc...
SEC
2008
14 years 11 months ago
Software Licence Protection and Management for Organisations
Abstract Most organisations have recently converted their physical assets into digital forms. This underlines the needs to have different types of software products to manage such ...
Muntaha Alawneh, Imad M. Abbadi
SPLC
2008
14 years 11 months ago
Building a Family of Compilers
We have developed and maintained a set of closely related compilers. Although much of their code is duplicated and shared, they have been maintained separately because they are tr...
Wonseok Chae, Matthias Blume
ISSA
2004
14 years 11 months ago
A General Methodology For The Development Of An Effective Information Security Policy
In today's hi-tech world, conventional physical security methods are simply insufficient for the protection of an organisation's information assets. This is because of t...
Arvish Ramdeyal