Sciweavers

1675 search results - page 76 / 335
» The Value of a Good Name
Sort
View
BDIM
2008
IEEE
141views Business» more  BDIM 2008»
13 years 11 months ago
IT confidentiality risk assessment for an architecture-based approach
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic as...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul...
SOCRATES
2008
100views Education» more  SOCRATES 2008»
13 years 10 months ago
Quality in eLearning. Some Results from a National Research Program
Quality is an open concept. Something has a good quality when the most salient of its characteristics have a positive value. What are this relevant features? It depends on the int...
Patrizia Ghislandi, Anna Pedroni, Daniela Paolino,...
IRMA
2000
13 years 10 months ago
EMC - A modeling method for developing web-based applications
Early information systems were mainly built around secondary, administrative processes of the value chain (e.g. accounting). But since the internet came into use, more and more pr...
Peter Rittgen
WCE
2007
13 years 10 months ago
A Competitive Online Algorithm for File Restriping
—We present a 3-competitive online algorithm for determining when to restripe a file for the case when the optimum stripe depth can take one of two possible values, depending on ...
Mario R. Medina
AMC
2008
92views more  AMC 2008»
13 years 9 months ago
Explicit multi-step peer methods for special second-order differential equations
The construction of s-stage explicit two- and three-step peer methods of order p = 2s and p = 3s is considered for the solution of non-stiff second order initial value problems wh...
Stefan Jebens, Rüdiger Weiner, Helmut Podhais...