Sciweavers

2588 search results - page 373 / 518
» Project risk management
Sort
View
INFOSECCD
2006
ACM
15 years 10 months ago
Campus-wide spyware and virus removal as a method of teaching information security
As Armstrong Atlantic State University prepares to enter the wireless world during the 2006-07 academic year, it is important that those connecting to the university’s network u...
Frank H. Katz
JCDL
2006
ACM
119views Education» more  JCDL 2006»
15 years 10 months ago
Learning from artifacts: metadata utilization analysis
Describes the MARC Content Designation Utilization Project, which is examining a very large set of metadata records as artifacts of the library cataloging enterprise. This is the ...
William E. Moen, Shawne D. Miksa, Amy Eklund, Serh...
MIR
2006
ACM
132views Multimedia» more  MIR 2006»
15 years 10 months ago
Retrieval of Ottoman documents
There is a growing need to access historical Ottoman documents stored in large archives and therefore managing tools for automatic searching, indexing and transcription of these d...
Esra Ataer, Pinar Duygulu
171
Voted
ISAS
2005
Springer
15 years 9 months ago
Proof-Based System Engineering Using a Virtual System Model
Abstract. This paper provides an overview of Proof-Based System Engineering (PBSE), which aims at improving the current practice of developing computer-based systems. PBSE is of pa...
Martin Biely, Gérard Le Lann, Ulrich Schmid
MRCO
2005
Springer
15 years 9 months ago
An Engineering Approach to Adaptation and Calibration
A new computing era after Mainframes, PC’s and mobiles is becoming more and more anticipated since the beginning of the 21st century. This new era is often described with several...
Michael Fahrmair, Wassiou Sitou, Bernd Spanfelner