Sciweavers

356 search results - page 51 / 72
» A Case Study of the Release Management of a Health-care Info...
Sort
View
DOLAP
2010
ACM
13 years 5 months ago
Using ontologies to discover fact IDs
Object identification is a crucial step in most information systems. Nowadays, we have many different ways to identify entities such as surrogates, keys and object identifiers. Ho...
Alberto Abelló, Oscar Romero
KIVS
2007
Springer
14 years 1 months ago
Semantic Integration of Identity Data Repositories
Abstract. With the continuously growing number of distributed and heterogeneous IT systems there is the need for structured and efficient identity management (IdM) processes. This ...
Christian Emig, Kim Langer, Jürgen Biermann, ...
EJIS
2010
112views more  EJIS 2010»
13 years 7 months ago
Toward an 'IT Conflict-Resistance Theory': action research during IT pre-implementation
Most empirical research on users' resistance toward Information Technology (IT) has been conducted after implementation of IT in organisations. Little research has been done ...
Regis Meissonier, Emmanuel Houzé
OTM
2010
Springer
13 years 6 months ago
An Interaction Meta-model for Cooperative Component-Based User Interfaces
Abstract. Model Driven Engineering (MDE) aims to help software deto abstract the system implementations by means of models and meta-models. In Web-based Collaborative Information S...
Luis Iribarne, Nicolás Padilla, Javier Cria...
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
14 years 29 days ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich