Sciweavers

279 search results - page 35 / 56
» 20 Years of ECM
Sort
View
JDCTA
2008
160views more  JDCTA 2008»
13 years 8 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
ISI
2006
Springer
13 years 8 months ago
Computational Modeling and Experimental Validation of Aviation Security Procedures
Security of civil aviation has become a major concern in recent years, leading to a variety of protective measures related to airport and aircraft security to be established by re...
Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
INFSOF
2007
90views more  INFSOF 2007»
13 years 8 months ago
Interpretation, interaction and reality construction in software engineering: An explanatory model
The incorporation of social issues in software engineering is limited. Still, during the last 20 years the social element inherent in software development has been addressed in a ...
Kari Rönkkö
COMCOM
2004
79views more  COMCOM 2004»
13 years 8 months ago
Anomaly detection methods in wired networks: a survey and taxonomy
Despite the advances reached along the last 20 years, anomaly detection in network behavior is still an immature technology, and the shortage of commercial tools thus corroborates...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
PROPERTYTESTING
2010
13 years 6 months ago
Transitive-Closure Spanners: A Survey
We survey results on transitive-closure spanners and their applications. Given a directed graph G = (V, E) and an integer k 1, a k-transitive-closure-spanner (k-TC-spanner) of G ...
Sofya Raskhodnikova