Sciweavers

3196 search results - page 339 / 640
» Knowledge Acquisition for Knowledge Management
Sort
View
SAC
2010
ACM
15 years 10 months ago
Ontology-based generation of IT-security metrics
Legal regulations and industry standards require organizations to measure and maintain a specified IT-security level. Although several IT-security metrics approaches have been de...
Stefan Fenz
142
Voted
ICSE
2008
IEEE-ACM
16 years 4 months ago
Clonetracker: tool support for code clone management
Code clones are generally considered to be an obstacle to software maintenance. Research has provided evidence that it may not always be practical, feasible, or cost-effective to ...
Ekwa Duala-Ekoko, Martin P. Robillard
MOBIHOC
2006
ACM
16 years 3 months ago
Robust distributed node localization with error management
Location knowledge of nodes in a network is essential for many tasks such as routing, cooperative sensing, or service delivery in ad hoc, mobile, or sensor networks. This paper in...
Juan Liu, Ying Zhang, Feng Zhao
111
Voted
ICALT
2007
IEEE
15 years 10 months ago
Managing Personalized and Adapted Medical Learning Objects
Medical learning objects deviates from traditional notion of learning object in that it is always in a digital form and relates to medication. They may include text, images, sound...
Juha Puustjärvi, Leena Puustjärvi
125
Voted
WISE
2007
Springer
15 years 9 months ago
Managing Process Customizability and Customization: Model, Language and Process
One of the fundamental ideas of services and service oriented architecture is the possibility to develop new applications by composing existing services into business processes. Ho...
Alexander Lazovik, Heiko Ludwig