Sciweavers

7285 search results - page 1427 / 1457
» On Challenges for Information Management Technology
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Security Policies to Mitigate Insider Threat in the Document Control Domain
With rapid advances in online technologies, organizations are migrating from paper based resources to digital documents to achieve high responsiveness and ease of management. Thes...
Suranjan Pramanik, Vidyaraman Sankaranarayanan, Sh...
COOPIS
2004
IEEE
13 years 11 months ago
A Framework for Prototyping J2EE Replication Algorithms
In application server systems, such as J2EE, replication is an essential strategy for reliability and efficiency. Many J2EE implementations, both commercial and open-source, provid...
Özalp Babaoglu, Alberto Bartoli, Vance Maveri...
COOPIS
2004
IEEE
13 years 11 months ago
Automatic Initiation of an Ontology
We report on an a set of experiments carried out in the context of the Flemish OntoBasis project. Our purpose is to extract semantic relations from text corpora in an unsupervised ...
Marie-Laure Reinberger, Peter Spyns, A. Johannes P...
CAISE
2006
Springer
13 years 11 months ago
Compliant and Flexible Business Processes with Business Rules
When modeling business processes, we often implicity think of internal business policies and external regulations. Yet to date, little attention is paid to avoid hard-coding polici...
Stijn Goedertier, Jan Vanthienen
CIKM
2006
Springer
13 years 11 months ago
Structure-based querying of proteins using wavelets
The ability to retrieve molecules based on structural similarity has use in many applications, from disease diagnosis and treatment to drug discovery and design. In this paper, we...
Keith Marsolo, Srinivasan Parthasarathy, Kotagiri ...
« Prev « First page 1427 / 1457 Last » Next »