Sciweavers

835 search results - page 65 / 167
» A calculus of challenges and responses
Sort
View
MASCOTS
2008
13 years 11 months ago
Evaluating the Effectiveness of Information Extraction in Real-World Storage Management
As storage deployments within enterprises continue to grow, there is an increasing need to simplify and automate. Existing tools for automation rely on extracting information in t...
Aameek Singh, Sandeep Uttamchandani, Yin Wang
MKWI
2008
151views Business» more  MKWI 2008»
13 years 11 months ago
Towards A Formal Framework for Business Process Compliance
: The advent of regulatory compliance requirements such as Sarbanes Oxley Act has forced enterprises to set up a process for managing an effective internal controls system on busin...
Kioumars Namiri, Nenad Stojanovic
CSREASAM
2006
13 years 11 months ago
Role Based Access Control and the JXTA Peer-to-Peer Framework
Role based access control (RBAC) allows users access to resources based on their competencies and responsibilities within an organization. Typically, RBAC is provided as a securit...
Amit Mathur, Suneuy Kim, Mark Stamp
ICAD
2004
13 years 11 months ago
Listen (Awakening)
For the ICAD conference 2004 in Sydney a sonification of ECG and other data was carried out to merge the boundaries between artistic sonification and scientific auditory display. ...
David Payling
ICEB
2004
175views Business» more  ICEB 2004»
13 years 11 months ago
Privacy-Preserving Data Mining in Electronic Surveys
Electronic surveys are an important resource in data mining. However, how to protect respondents' data privacy during the survey is a challenge to the security and privacy co...
Justin Z. Zhan, Stan Matwin