Sciweavers

2795 search results - page 433 / 559
» Recommendations on recommendations
Sort
View
IMAGING
2004
13 years 9 months ago
Mathematical Discontinuities in CIEDE2000 Color Difference Computations
We examine mathematical properties of the CIEDE2000 color difference formula and illustrate that the CIEDE2000 color difference is not a continuous function of the CIELAB color pa...
Gaurav Sharma, Wencheng Wu, Edul N. Dalal, Mehmet ...
ISSA
2004
13 years 9 months ago
A Comparative Study Of Standards And Practices Related To Information Security Management
The need for Information Security in organisations, regardless of their type and size, is being addressed by emerging standards and recommended best practices. The various standar...
Evangelos D. Frangopoulos
ISSA
2004
13 years 9 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li
ISSA
2004
13 years 9 months ago
Towards Hippocratic Log Files
The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium combine to make ...
Andrew Rutherford
ECIS
2003
13 years 9 months ago
Finding a home for web-based information systems - perusing the landscape
Information systems (IS) and software engineering (SE) have shared the domain of systems and software development for several decades with too little overlap in practice and resea...
Chris Barry, Jeremy Brown