Sciweavers

378 search results - page 50 / 76
» Security requirement analysis of business processes
Sort
View
ICIS
2004
13 years 9 months ago
Desperately Seeking Systems Thinking in the Information Systems Discipline
Although called systems, information systems in organizations are often viewed as tools that "users" use. IS success is often gauged as though it were about acceptance a...
Steven Alter
SIGUCCS
2003
ACM
14 years 26 days ago
Higher education ERP: a framework to reduce the pain
Higher Education Institutions are now spending a significant portion of their budget to implement and maintain modern Enterprise Resource Planning (ERP) solutions. ERP is a softwa...
Kris T. Pegah, Mahmoud Pegah, Terry M. Dillow
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 1 months ago
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause a disruption for streaming traffic. Roaming in wire...
Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, J...
ANCS
2009
ACM
13 years 5 months ago
SANS: a scalable architecture for network intrusion prevention with stateful frontend
Inline stateful and deep inspection for intrusion prevention is becoming more challenging due to the increase in both the volume of network traffic and the complexity of the analy...
Fei He, Yaxuan Qi, Yibo Xue, Jun Li
ACL
1996
13 years 9 months ago
From Submit to Submitted via Submission: On Lexical Rules in Large-Scale Lexicon Acquisition
This paper deals with the discovery, representation, and use of lexical rules (LRs) during large-scale semi-automatic computational lexicon acquisition. The analysis is based on a...
Evelyne Viegas, Boyan A. Onyshkevych, Victor Raski...