Sciweavers

14235 search results - page 2788 / 2847
» Is computer science science
Sort
View
130
Voted
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
15 years 8 months ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
125
Voted
GIS
2009
ACM
15 years 8 months ago
Data structures and intersection algorithms for 3D spatial data types
Apart from visualization tasks, three-dimensional (3D) data management features are not or only hardly available in current spatial database systems and Geographic Information Sys...
Tao Chen, Markus Schneider
CCS
2001
ACM
15 years 8 months ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
165
Voted
IFIP
2001
Springer
15 years 8 months ago
The Phenomenon of Diffusion
This paper presents processing and visualization techniques for Diffusion Tensor Magnetic Resonance Imaging (DT-MRI). In DT-MRI, each voxel is assigned a tensor that describes loc...
Tor J. Larsen
136
Voted
UML
2001
Springer
15 years 8 months ago
Agile Modeling: A Brief Overview
: Agile Modeling (AM) is a practice-based methodology for effective modeling of software-based systems. Where the Unified Modeling Language (UML) defines a subset of the modeling t...
Scott W. Ambler
« Prev « First page 2788 / 2847 Last » Next »