Sciweavers

1368 search results - page 106 / 274
» Knowledge Management in Network Contexts
Sort
View
CAISE
2006
Springer
14 years 1 months ago
A Matchmaking-based Ontology Evolution Methodology
In this paper, we present the H-Change methodology we have specifically conceived for evolving independent ontologies in open networked systems. Furthermore, we describe the change...
Silvana Castano, Alfio Ferrara, Stefano Montanelli
DSOM
2003
Springer
14 years 2 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
ICSE
2008
IEEE-ACM
14 years 10 months ago
Predicting defects using network analysis on dependency graphs
In software development, resources for quality assurance are limited by time and by cost. In order to allocate resources effectively, managers need to rely on their experience bac...
Thomas Zimmermann, Nachiappan Nagappan
ICDAR
1999
IEEE
14 years 1 months ago
Cursive Character Detection using Incremental Learning
This paper describes a new hybrid architecture for an artificial neural network classifier that enables incremental learning. The learning algorithm of the proposed architecture d...
Jean-François Hébert, Marc Parizeau,...
BIS
2009
112views Business» more  BIS 2009»
13 years 7 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri