Sciweavers

35 search results - page 5 / 7
» General Introduction
Sort
View
ACSAC
2003
IEEE
14 years 26 days ago
Protecting Personal Data: Can IT Security Management Standards Help?
Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidel...
Giovanni Iachello
ICFP
2000
ACM
13 years 12 months ago
Intersection types and computational effects
We show that standard formulations of intersection type systems are unsound in the presence of computational effects, and propose a solution similar to the value restriction for ...
Rowan Davies, Frank Pfenning
ISCAS
1994
IEEE
131views Hardware» more  ISCAS 1994»
13 years 11 months ago
An Efficient Design Method for Optimal Weighted Median Filtering
Earlier research has shown that the problem of optimal weighted median filtering with structural constraints can be formulated as a nonconvex nonlinear programming problem in gene...
Ruikang Yang, Moncef Gabbouj, Yrjö Neuvo
EATIS
2007
ACM
13 years 11 months ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler
WWW
2008
ACM
14 years 8 months ago
Tagpedia: a Semantic Reference to Describe and Search for Web Resources
Nowadays the Web represents a growing collection of an enormous amount of contents where the need for better ways to find and organize the available data is becoming a fundamental...
Francesco Ronzano, Andrea Marchetti, Maurizio Tesc...