Sciweavers

1265 search results - page 150 / 253
» Finding the Key to a Synapse
Sort
View
ISSA
2004
13 years 10 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li
IAAI
2001
13 years 10 months ago
CARMA: A Case-Based Range Management Advisor
: CARMA is an advisory system for rangeland grasshopper infestations that demonstrates how AI technology can deliver expert advice to compensate for cutbacks in public services. CA...
Karl Branting, John D. Hastings, Jeffrey A. Lockwo...
ECIS
2003
13 years 10 months ago
A case of 'non strategic' alignment - An IT and business unit liaison role
The nature of higher-level interactions in facilitating strategic alignment has received much attention in the past decade. The study sets out to explore the nature of the interac...
Owen Harte Barry, Brian O'Flaherty
ECIS
2003
13 years 10 months ago
An exploratory case study on IS implementation and organizational change in China
Owing to the turbulent and fast changing environment in which Chinese firms operate, Information Systems (IS) implementation triggers important organizational changes in these fir...
Huixian Li, John Lim, K. S. Raman
ECSCW
2003
13 years 10 months ago
Applying Cyber-Archaeology
Online spaces that enable public shared inter-personal communications are of significant social and economic importance. This paper outlines a theoretical model and methodology, la...
Quentin Jones