Sciweavers

825 search results - page 99 / 165
» Internal Iteration Externalized
Sort
View
COMSWARE
2006
IEEE
14 years 1 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
HICSS
2006
IEEE
113views Biometrics» more  HICSS 2006»
14 years 1 months ago
Examining Cross-Agency Collaborations in E-Government Initiatives
Cross-agency collaborations are critical to the success of e-government, which has great potential to transform the way that governments work, share information and deliver servic...
Paul Jen-Hwa Hu, Dai Cui, Alan Charles Sherwood
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
14 years 1 months ago
The Effect of Group Support Systems on the Emergence of Unique Information in a Risk Management Process: A Field Study
The management of operational risks, i.e., risks of loss resulting from inadequate or failed processes, people and systems or from external events, is crucial for the stability of...
Anne-Françoise Rutkowski, Bartel Van de Wal...
IWPC
2006
IEEE
14 years 1 months ago
A Metric-Based Heuristic Framework to Detect Object-Oriented Design Flaws
One of the important activities in re-engineering process is detecting design flaws. Such design flaws prevent an efficient maintenance, and further development of a system. Th...
Mazeiar Salehie, Shimin Li, Ladan Tahvildari
ADC
2006
Springer
130views Database» more  ADC 2006»
14 years 1 months ago
A two-phase rule generation and optimization approach for wrapper generation
Web information extraction is a fundamental issue for web information management and integrations. A common approach is to use wrappers to extract data from web pages or documents...
Yanan Hao, Yanchun Zhang