Sciweavers

1422 search results - page 270 / 285
» Information security and risk management
Sort
View
COMAD
2009
13 years 10 months ago
When to Trigger Active Rules?
Active rules model and enforce enterprise requirements such as situation monitoring using events, conditions and actions. These rules are termed active rules as they make the unde...
Raman Adaikkalavan, Sharma Chakravarthy
SIGCSE
2008
ACM
128views Education» more  SIGCSE 2008»
13 years 8 months ago
Cybercivics: a novel approach to reaching k-12 students with the social relevance of computer science
This paper describes CyberCivics, a novel approach to computer science outreach that integrates hands-on computing experiences with the study of contemporary social and political ...
Jim Owens, Jeanna Matthews
JCM
2007
143views more  JCM 2007»
13 years 8 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
VLC
2008
146views more  VLC 2008»
13 years 8 months ago
Interactive visual analysis of geographic data on mobile devices based on dynamic queries
The capabilities of current mobile devices, especially PDAs, are making it possible to design and develop mobile applications that employ visual techniques for using geographic da...
Stefano Burigat, Luca Chittaro
CJ
2010
130views more  CJ 2010»
13 years 6 months ago
Dynamic Service Execution in Sensor Networks
Sensor networks face a number of challenges when deployed in unpredictable environments under dynamic, quickly changeable demands, and when shared by many partners, which is often...
Lei Chen 0005, Zijian Wang, Boleslaw K. Szymanski,...