Sciweavers

2653 search results - page 456 / 531
» Business process reengineering
Sort
View
IEEEARES
2009
IEEE
14 years 2 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira
CSE
2009
IEEE
14 years 2 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...
INFOCOM
2009
IEEE
14 years 2 months ago
Power-Aware Speed Scaling in Processor Sharing Systems
—Energy use of computer communication systems has quickly become a vital design consideration. One effective method for reducing energy consumption is dynamic speed scaling, whic...
Adam Wierman, Lachlan L. H. Andrew, Ao Tang
WEBDB
2009
Springer
112views Database» more  WEBDB 2009»
14 years 2 months ago
Querying DAG-shaped Execution Traces Through Views
The question whether a given set of views, defined by queries, can be used to answer another query, arises in several contexts such as query optimization, data integration and se...
Maya Ben-Ari, Tova Milo, Elad Verbin
WEBDB
2009
Springer
159views Database» more  WEBDB 2009»
14 years 2 months ago
Beyond the Stars: Improving Rating Predictions using Review Text Content
Online reviews are an important asset for users deciding to buy a product, see a movie, or go to a restaurant, as well as for businesses tracking user feedback. However, most revi...
Gayatree Ganu, Noemie Elhadad, Amélie Maria...