Sciweavers

2624 search results - page 445 / 525
» On Business Process Model Transformations
Sort
View
ACSC
2003
IEEE
15 years 9 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
HICSS
2003
IEEE
95views Biometrics» more  HICSS 2003»
15 years 9 months ago
Matching Needs - Application Service Providing for Asynchronous Learning Networks
Universities have severe difficulties in using elearning applications successfully due to organizational problems to provide them. Providing a web-based learning environment is an...
Wolf-Gideon Bleek, Iver Jackewitz, Bernd Pape
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
15 years 9 months ago
Knowledge-Based IS Implementation Support: An Application to the IS Change Agent Role Problem
The threat of abandoned or extensively overhauled IS is a major concern for both MIS specialists and businesses. This concern may stem from the mismatch between MIS specialist cha...
Meral Binbasioglu, Elaine Winston
APSEC
2000
IEEE
15 years 8 months ago
Service-based software: the future for flexible software
For the past 40 years, the techniques, processes and methods of software development have been dominated by supply-side issues, giving rise to a software industry oriented towards...
Keith H. Bennett, Paul J. Layzell, David Budgen, P...
ECHT
1992
15 years 8 months ago
Two Years before the Mist: Experiences with Aquanet
Aquanet is a collaborative hypertext tool that combines elements of frame-based knowledge representation and graphical presentation. In this paper, we examine the first major appl...
Catherine C. Marshall, Russell A. Rogers