Sciweavers

3149 search results - page 172 / 630
» IT security risk management
Sort
View
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
14 years 2 months ago
Towards an Ontology for e-Document Management in Public Administration - the Case of Schleswig-Holstein
An action research project in the state administration of Schleswig-Holstein (Germany) seeks to answer the following questions: How can we organize and present edocuments so that ...
Ralf Klischewski
FLAIRS
2003
13 years 10 months ago
Decision Evaluation of Three Flood Management Strategies
This article describes the application of computational decision analytic techniques for a national policy decision. It constitutes an example of the increasing use of modern comp...
Mats Danielson, Love Ekenberg, Jim Johansson
NCA
2007
IEEE
13 years 8 months ago
Safety management of complex technology
One of the key success factors behind the human species is the ability to think, plan and pursue goals. Apart from wisdom and tacit knowledge, experience and awareness of the phys...
Ali G. Hessami
SAC
2004
ACM
14 years 2 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
ISCC
2007
IEEE
127views Communications» more  ISCC 2007»
14 years 3 months ago
Head-to-Tail: Managing Network Load through Random Delay Increase
Window-based congestion control is typically based on exhausting bandwidth capacity, which occasionally leads to transient congestion. Moreover, flow synchronization may deteriora...
Stylianos Dimitriou, Vassilis Tsaoussidis