Sciweavers

8767 search results - page 119 / 1754
» Enterprise Data Management
Sort
View
123
Voted
SIGIR
2008
ACM
15 years 4 months ago
Modeling expert finding as an absorbing random walk
We introduce a novel approach to expert finding based on multi-step relevance propagation from documents to related candidates. Relevance propagation is modeled with an absorbing ...
Pavel Serdyukov, Henning Rode, Djoerd Hiemstra
DBSEC
2009
122views Database» more  DBSEC 2009»
15 years 5 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
TPCTC
2009
Springer
104views Hardware» more  TPCTC 2009»
15 years 10 months ago
The State of Energy and Performance Benchmarking for Enterprise Servers
To address the server industry’s marketing focus on performance, benchmarking organizations have played a pivotal role in developing techniques to determine the maximum achievabl...
Andrew Fanara, Evan Haines, Arthur Howard
HICSS
2008
IEEE
133views Biometrics» more  HICSS 2008»
15 years 10 months ago
A Study of the Causal Relationship between IT Governance Inhibitors and Its Success in Korea Enterprises
In recent years, the emergence of the term IT Governance (ITG) has pointed to the increasing importance for business of effecting an alignment between its strategic direction and ...
Chi-Hoon Lee, Jung-Hoon Lee, Jong-Sung Park, Kap-Y...
NDSS
2008
IEEE
15 years 10 months ago
Analyzing Privacy in Enterprise Packet Trace Anonymization
Accurate network measurement through trace collection is critical for advancing network design and for maintaining secure, reliable networks. Unfortunately, the release of network...
Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Don...