Sciweavers

65 search results - page 7 / 13
» Assessing the enterprise's knowledge management maturity lev...
Sort
View
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 5 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
EUROMICRO
1998
IEEE
13 years 11 months ago
Software Quality Assurance - Concepts and Misconceptions
Software quality engineering is concerned with building software products with required quality and assessing the level of quality. Software processes are important assets in achi...
Per Runeson, Peter Isacsson
MI
1993
13 years 8 months ago
Putting knowledge rich plan representations to use
AI planning research is now maturing and nding practical application in the commercial, industrial, engineering and defence sectors. This has led to a rapid expansion in the last ...
Austin Tate
DAWAK
2006
Springer
13 years 11 months ago
Integrating Different Grain Levels in a Medical Data Warehouse Federation
Healthcare organizations practicing evidence-based medicine strive to unite their data resources in order to achieve a wider knowledge base for sophisticated research and matured d...
Marko Banek, A. Min Tjoa, Nevena Stolba
CCE
2007
13 years 9 months ago
Product Based Interoperability - Approaches and Requirements
: Product data, information and knowledge are the core ICT resources for collaborative design. This paper describes five different approaches to exchanging and sharing product data...
Håvard D. Jørgensen, Dag Karlsen, Fra...