Sciweavers

3737 search results - page 664 / 748
» Knowledge Management and Promises
Sort
View
SIS
2008
13 years 9 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
NETWORKING
2007
13 years 9 months ago
On-Line Predictive Load Shedding for Network Monitoring
Building robust network monitoring applications is hard given the unpredictable nature of network traffic. Complex analysis on streaming network data usually leads to overload situ...
Pere Barlet-Ros, Diego Amores-López, Gianlu...
ACSW
2006
13 years 9 months ago
Toward building grid applications in bioinformatics
In silico bioinformatics experiments involve integration of and access to computational tools and biological databases. The emerging grid computing technologies enable bioinformat...
Xiujun Gong, Kensuke Nakamura, Kei Yura, Nobuhiro ...
ASC
2006
13 years 9 months ago
A WAM implementation for flexible query answering
In [7] Maria I. Sessa extended the SLD resolution principle with the ability of performing approximate reasoning and flexible query answering. The operational mechanism of similar...
Pascual Julián Iranzo, Clemente Rubio-Manza...
ECIS
2004
13 years 9 months ago
IS Process Innovation Unlearning in Organisations
This paper identifies mechanisms that affected over 200 Information System Process Innovation (ISPI) unlearning decisions in three organisational environments over a period that s...
Erja Mustonen-Ollila