Sciweavers

1425 search results - page 39 / 285
» The combined ISAC-ER methodology of information systems deve...
Sort
View
LAWEB
2005
IEEE
14 years 1 months ago
Web Development Evolution: The Assimilation of Web Engineering Security
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security iss...
William Bradley Glisson, Ray Welland
ACSW
2006
13 years 9 months ago
Event sequence mining to develop profiles for computer forensic investigation purposes
Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations. Information found in data obtained by investigators ca...
Tamas Abraham
AMC
2008
111views more  AMC 2008»
13 years 8 months ago
Chemical agent detector placement methodology
Terrorism is a threat to global peace in our world today and in the future this terrorist threat is surely going to be important. Global terrorist groups have highly sophisticated...
Cevriye Gencer, Emel Kizilkaya Aydogan, Abdullah S...
COMSIS
2004
119views more  COMSIS 2004»
13 years 7 months ago
A Method and a Tool for Rapid Prototyping of Large-Scale Business Information Systems
This paper presents a method and concepts of a supporting tool for rapid prototyping of large-scale business information systems. Our method is based on the following guidelines: (...
Gordana Milosavljevic, Branko Perisic
ECIS
2003
13 years 9 months ago
A multi-model algorithm for the cost-oriented design of the information technology infrastructure
Multiple combinations of hardware and network components can be selected to design an information technology (IT) infrastructure that satisfies performance requirements. The profe...
Danilo Ardagna, Chiara Francalanci, Marco Trubian