Sciweavers

2710 search results - page 424 / 542
» Knowledge Management with Snapshots
Sort
View
153
Voted
ESCIENCE
2006
IEEE
15 years 9 months ago
Market-Based Resource Allocation in Grids
The core goal of resource management is to establish a mutual agreement between a resource producer and a resource consumer by which the provider agrees to supply a capability tha...
Behnaz Pourebrahimi, Koen Bertels, G. M. Kandru, S...
108
Voted
HICSS
2006
IEEE
150views Biometrics» more  HICSS 2006»
15 years 9 months ago
E-Government Evaluation: Reflections on Two Organisational Studies
Senior executives in public sector organisations have been charged with delivering an e-Government agenda. A key emerging area of research is that of the evaluation of e-Governmen...
Stephen Jones, Zahir Irani, Amir M. Sharif, Marino...
133
Voted
ICSEA
2006
IEEE
15 years 9 months ago
A Two-Year Software Engineering M.Sc. Degree Designed Under the Bologna Declaration Principles
This paper presents and discusses the syllabus of a second cycle degree on Software Engineering in which any student that finishes any undergraduate Computing degree (Computer Eng...
João M. Fernandes, Ricardo Jorge Machado
150
Voted
IEEESCC
2006
IEEE
15 years 9 months ago
Using Assumptions in Service Composition Context
Service composition aims to provide an efficient and accurate model of a service, based on which the global service oriented architecture (SOA) can be realized, allowing value add...
Zheng Lu, Aditya Ghose, Peter Hyland, Ying Guan
165
Voted
IWIA
2006
IEEE
15 years 9 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock