Sciweavers

1047 search results - page 133 / 210
» Semantic Business Process Management: Scaling Up the Managem...
Sort
View
ESEM
2009
ACM
14 years 2 months ago
Using security metrics coupled with predictive modeling and simulation to assess security processes
: © Using Security Metrics Coupled with Predictive Modeling and Simulation to Assess Security Processes Yolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu HP Laborato...
Yolanta Beres, Marco Casassa Mont, Jonathan Griffi...
WSE
2002
IEEE
14 years 18 days ago
Migrating to the Web a Legacy Application: The Sinfor Project
Various approaches can be used to migrate legacy applications to the Web. In particular, migrating dataintensive legacy applications (e.g. traditional application for business man...
Damiano Distante, Vito Perrone, Mario A. Bochicchi...
PAKM
1998
13 years 9 months ago
Helping Clients Harness Knowledge to Drive Innovation
By assembling information in such a way that it becomes an intellectual asset, an organization can link structured and unstructured information to allow people to exploit the info...
David Connor, Matthias Gutknecht
CORR
2011
Springer
162views Education» more  CORR 2011»
12 years 11 months ago
Re-thinking Enrolment in Identity Card Schemes
Many countries around the world have initiated national ID card programs in the last decade. These programs are considered of strategic value to governments due to its contributio...
Ali M. Al-Khouri
GVD
2009
191views Database» more  GVD 2009»
13 years 5 months ago
Query Processing on Multi-Core Architectures
The upcoming generation of computer hardware poses several new challenges for database developers and engineers. Software in general and database management systems (DBMSs) in par...
Frank Huber, Johann Christoph Freytag