Sciweavers

1544 search results - page 129 / 309
» The Process of Adoption
Sort
View
COMPSEC
2004
156views more  COMPSEC 2004»
15 years 3 months ago
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
Denis Besnard, Budi Arief
118
Voted
DMS
2010
155views Multimedia» more  DMS 2010»
15 years 2 months ago
Ontological Filters for Slow Intelligence Systems
: Slow Intelligence Systems are general-purpose systems characterized by being able to improve performance over time through a process involving enumeration, propagation, adaptatio...
Shi-Kuo Chang, Emilio Zegarra, Chia Chun Shih, Tin...
139
Voted
ITIIS
2008
149views more  ITIIS 2008»
15 years 2 months ago
Sharing e-Learning Object Metadata Using ebXML Registries for Semantic Grid Computing
To facilitate the processes of e-learning resource description, discovery and reuse, e-learning objects should be appropriately described and classified using standard metadata th...
Hyoung Do Kim
146
Voted
ICWS
2010
IEEE
15 years 2 months ago
Towards Improved Data Dissemination of Publish-Subscribe Systems
—with the proliferation of internet technologies, publish/subscribe systems have gained wide usage as a middleware. However for this model, catering large number of publishers an...
Ramith Jayasinghe, Dinesh Gamage, Srinath Perera
121
Voted
IEICET
2010
96views more  IEICET 2010»
15 years 2 months ago
An Unsupervised Optimization of Structuring Elements for Noise Removal Using GA
—To recover texture images from impulse noise by the opening operation which is one of morphological operations, an suitable structuring element (SE) has to be estimated. Hithert...
Hiroyuki Okuno, Yoshiko Hanada, Mitsuji Muneyasu, ...