Sciweavers

3737 search results - page 548 / 748
» Knowledge Management and Promises
Sort
View
228
Voted
JUCS
2010
135views more  JUCS 2010»
15 years 1 months ago
Locating and Crawling eGovernment Services A Light-weight Semantic Approach
Abstract: The application of Web 2.0 tools and methodologies in the domain of eGovernment is not yet a fully exploited area due to the immaturity of the software support, and the l...
Luis Álvarez Sabucedo, Luis E. Anido-Rif&oa...
109
Voted
RAID
2010
Springer
15 years 1 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
136
Voted
FAST
2009
15 years 13 days ago
Application of Named Graphs Towards Custom Provenance Views
Provenance capture as applied to execution oriented and interactive workflows is designed to record minute detail needed to support a "modify and restart" paradigm as we...
Tara Gibson, Karen Schuchardt, Eric G. Stephan
117
Voted
IJEC
2010
148views more  IJEC 2010»
14 years 12 months ago
Collaborative Performance: Addressing the ROI of Collaboration
Collaboration is a hot issue, and is to an increasing extent recognized as a key driver of overall business performance. However, few companies methodically evaluate how well they...
Kjetil Kristensen, Björn Kijl
124
Voted
ANOR
2011
169views more  ANOR 2011»
14 years 6 months ago
Predetermined intervals for start times of activities in the stochastic project scheduling problem
This paper proposes a new methodology to schedule activities in projects with stochastic activity durations. The main idea is to determine for each activity an interval in which th...
Illana Bendavid, Boaz Golany