: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
: In this paper we analyze some existing tools and approaches to image data modeling and we propose an Object-Oriented Image Data (OOID) model. It can be applied on a wide variety ...
Successful knowledge management may depend not only on knowledge capture, but on knowledge construction—on formulating new and useful knowledge that was not previously available...
David B. Leake, Ana Gabriela Maguitman, Thomas Rei...
: Both the information base, on which IS research and practice is founded, and its accessibility continue to grow rapidly. A major challenge facing the IS community in the next dec...
: Internet-based distance learning programs make it possible for technical communicators located anywhere in the world to participate in graduate courses in their field. But are th...