Sciweavers

1407 search results - page 206 / 282
» Systems Theory Model for Information Security
Sort
View
COMAD
2009
13 years 10 months ago
When to Trigger Active Rules?
Active rules model and enforce enterprise requirements such as situation monitoring using events, conditions and actions. These rules are termed active rules as they make the unde...
Raman Adaikkalavan, Sharma Chakravarthy
CHI
2007
ACM
14 years 9 months ago
Mapmover: a case study of design-oriented research into collective expression and constructed publics
In this paper we present the MapMover project as a case study into the use and design of an interactive system for collective expression. Informed by analysis and reflection we ad...
Carl F. DiSalvo, Jeff Maki, Nathan Martin
ICCS
2007
Springer
14 years 3 months ago
Trikonic Inter-Enterprise Architectonic
There is a need for information, application, and other enterprise architectures which are robust and flexible enough to meet the challenges of today’s heterogeneous, rapidly cha...
Gary Richmond
ATAL
2000
Springer
14 years 1 months ago
Generalised Object-Oriented Concepts for Inter-agent Communication
In this paper, we describe a framework to program open societies of concurrently operating agents. The agents maintain a subjective theory about their environment and interact with...
Rogier M. van Eijk, Frank S. de Boer, Wiebe van de...
GECCO
2008
Springer
229views Optimization» more  GECCO 2008»
13 years 10 months ago
EIN-WUM: an AIS-based algorithm for web usage mining
With the ever expanding Web and the information published on it, effective tools for managing such data and presenting information to users based on their needs are becoming nece...
Adel Torkaman Rahmani, B. Hoda Helmi