Sciweavers

939 search results - page 52 / 188
» A Case for Polyscopic Structuring of Information
Sort
View
ESSOS
2009
Springer
14 years 2 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
HICSS
2007
IEEE
183views Biometrics» more  HICSS 2007»
14 years 2 months ago
Rescuing Small and Medium-Sized Enterprises from Inefficient Information Systems - A Multi-disciplinary Method for ERP System Re
Enterprise resource planning (ERP) systems integrate companies’ multiple information systems and help adapt best practices for business processes. ERP systems are in most cases ...
Inka Vilpola, Ilkka Kouri, Kaisa Vään&au...
CAISE
2009
Springer
14 years 2 months ago
Deriving Information Requirements from Responsibility Models
Abstract. This paper describes research in understanding the requirements for complex information systems that are constructed from one or more generic COTS systems. We argue that,...
Ian Sommerville, Russell Lock, Tim Storer, John Do...
EDOC
2006
IEEE
14 years 1 months ago
Enterprise Computing Systems as Information Factories
The analysis, and eventual approval or rejection, of new enterprise information technology (IT) initiatives often proceeds on the basis of informal estimates of return on investme...
K. Mani Chandy, Lu Tian, Daniel M. Zimmerman
SEKE
2004
Springer
14 years 1 months ago
Information Integration Architecture Development: A Multi-Agent Approach
Multi-Agent Systems (MAS) architectures are gaining popularity for building open, distributed, and evolving software required by systems such as information integration application...
Stéphane Faulkner, Manuel Kolp, Tai Nguyen,...