Sciweavers

989 search results - page 87 / 198
» Analyzing Knowledge Management Systems: A Veritistic Approac...
Sort
View
CCS
2006
ACM
15 years 8 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
ISDA
2005
IEEE
15 years 9 months ago
Sharing User Models for Adaptive Hypermedia Applications
In this paper we present an approach to sharing a user model among several adaptive hypermedia applications. Current adaptive hypermedia applications often realize the user model ...
Mária Bieliková, Jaroslav Kuruc
IWPC
2009
IEEE
15 years 10 months ago
A bug you like: A framework for automated assignment of bugs
Assigning bug reports to individual developers is typically a manual, time-consuming, and tedious task. In this paper, we present a framework for automated assignment of bug-fixi...
Olga Baysal, Michael W. Godfrey, Robin Cohen
ICALT
2007
IEEE
15 years 10 months ago
The Web 2.0 Driven SECI Model Based Learning Process
Nonaka and his knowledge transformation model SECI revolutionized the thinking about organizations as social learning systems. He introduced technical concepts like hypertext into...
Mohamed Amine Chatti, Ralf Klamma, Matthias Jarke,...
FIW
2007
123views Communications» more  FIW 2007»
15 years 5 months ago
Composing Features by Managing Inconsistent Requirements
Abstract. One approach to system development is to decompose the requirements into features and specify the individual features before composing them. A major limitation of deferri...
Robin C. Laney, Thein Than Tun, Michael Jackson, B...