Sciweavers

1830 search results - page 197 / 366
» Implementing a Tamper-Evident Database System
Sort
View
128
Voted
ICDCSW
2005
IEEE
15 years 9 months ago
Forensix: A Robust, High-Performance Reconstruction System
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...
125
Voted
APWEB
2005
Springer
15 years 9 months ago
PODWIS: A Personalized Tool for Ontology Development in Domain Specific Web Information System
Complex structure and varying requirements increase the difficulties in developing domain specific Web Information Systems. People appeal to a smart tool to customize Web Informati...
Lv-an Tang, Hongyan Li, Zhiyong Pan, Shaohua Tan, ...
151
Voted
IWPC
1997
IEEE
15 years 7 months ago
Identifying objects in legacy systems
Many organisations are migrating towards object-oriented technology. However, owing to the business value of legacy software, new object-oriented development has to be weighed aga...
Aniello Cimitile, Andrea De Lucia, Giuseppe A. Di ...
107
Voted
HICSS
2009
IEEE
155views Biometrics» more  HICSS 2009»
15 years 10 months ago
Collaborative Recommender Systems for Building Automation
Building Automation Systems (BASs) can save building owners money by reducing energy consumption while simultaneously preserving occupant comfort. There are algorithms that optimi...
Michael LeMay, Jason J. Haas, Carl A. Gunter
111
Voted
CSCW
2004
ACM
15 years 9 months ago
Behind the help desk: evolution of a knowledge management system in a large organization
This paper examines the way in which a knowledge management system (KMS)—by which we mean the people, processes and software—came into being and evolved in response to a varie...
Christine Halverson, Thomas Erickson, Mark S. Acke...