Sciweavers

2710 search results - page 380 / 542
» Knowledge Management with Snapshots
Sort
View
JUCS
2010
135views more  JUCS 2010»
15 years 2 months ago
Locating and Crawling eGovernment Services A Light-weight Semantic Approach
Abstract: The application of Web 2.0 tools and methodologies in the domain of eGovernment is not yet a fully exploited area due to the immaturity of the software support, and the l...
Luis Álvarez Sabucedo, Luis E. Anido-Rif&oa...
128
Voted
RAID
2010
Springer
15 years 2 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
FAST
2009
15 years 1 months ago
Application of Named Graphs Towards Custom Provenance Views
Provenance capture as applied to execution oriented and interactive workflows is designed to record minute detail needed to support a "modify and restart" paradigm as we...
Tara Gibson, Karen Schuchardt, Eric G. Stephan
132
Voted
IJEC
2010
148views more  IJEC 2010»
15 years 1 months ago
Collaborative Performance: Addressing the ROI of Collaboration
Collaboration is a hot issue, and is to an increasing extent recognized as a key driver of overall business performance. However, few companies methodically evaluate how well they...
Kjetil Kristensen, Björn Kijl
136
Voted
ANOR
2011
169views more  ANOR 2011»
14 years 7 months ago
Predetermined intervals for start times of activities in the stochastic project scheduling problem
This paper proposes a new methodology to schedule activities in projects with stochastic activity durations. The main idea is to determine for each activity an interval in which th...
Illana Bendavid, Boaz Golany