Sciweavers

7651 search results - page 200 / 1531
» Information integration in the enterprise
Sort
View
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
14 years 3 months ago
Developing Video Services for Mobile Users
Video information, image processing and computer vision techniques are developing rapidly nowadays because of the availability of acquisition, processing and editing tools, which ...
Mohamed Ahmed, Roger Impey, Ahmed Karmouch
COMAD
2009
13 years 11 months ago
When to Trigger Active Rules?
Active rules model and enforce enterprise requirements such as situation monitoring using events, conditions and actions. These rules are termed active rules as they make the unde...
Raman Adaikkalavan, Sharma Chakravarthy
COMAD
2009
13 years 11 months ago
Consistency of Databases on Commodity Disk Drives
Most database systems use ARIES-like logging and recovery scheme to recover from failures and guarantee transactional consistency. ARIES relies on the Write-Ahead Logging (WAL) pr...
Robin Dhamankar, Hanuma Kodavalla, Vishal Kathuria
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 11 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
SAC
2006
ACM
13 years 10 months ago
Generating correct EPCs from configured C-EPCs
Process reference models play an important role for the alignment and configuration of commercial off-the-shelf Enterprise Systems to requirements of an organization. Recently, Co...
Jan Mendling, Jan Recker, Michael Rosemann, Wil M....