Sciweavers

2588 search results - page 285 / 518
» Project risk management
Sort
View
SIS
2008
15 years 6 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
CSREASAM
2004
15 years 6 months ago
A Unified Framework for Mobile Device Security
: Present-day handheld devices, such as PDAs, are a useful blend of hardware and software oriented toward the mobile workforce. While they provide the capability to review document...
Wayne A. Jansen, Serban I. Gavrila, Vlad Korolev
IJCAI
1997
15 years 6 months ago
Aggregating Features and Matching Cases on Vague Linguistic Expressions
Decision making based on the comparison of multiple criteria of two or more alternatives, is the subject of intensive research. In many decision making situations, a single criter...
Alfons Schuster, Werner Dubitzky, Philippe Lopes, ...
SIGMOD
2010
ACM
249views Database» more  SIGMOD 2010»
15 years 4 months ago
Worry-free database upgrades: automated model-driven evolution of schemas and complex mappings
Schema evolution is an unavoidable consequence of the application development lifecycle. The two primary schemas in an application, the client conceptual object model and the pers...
James F. Terwilliger, Philip A. Bernstein, Adi Unn...
ANOR
2007
180views more  ANOR 2007»
15 years 4 months ago
Ethics in OR/MS: past, present and future
Abstract The pervasiveness and impact on society and on every day human life of technology has led to a growing awareness that science and technology cannot be considered above or ...
Jean-Pierre Brans, Giorgio Gallo