Sciweavers

741 search results - page 94 / 149
» Tools and techniques for Network Forensics
Sort
View
ATAL
2008
Springer
13 years 11 months ago
An approach to online optimization of heuristic coordination algorithms
Due to computational intractability, large scale coordination algorithms are necessarily heuristic and hence require tuning for particular environments. In domains where character...
Jumpol Polvichai, Paul Scerri, Michael Lewis
ECIS
2001
13 years 10 months ago
E-Business Strategy Formulating and Forming: New Wine in Old Bottles?
The motivation for strategic action should be highest in volatile, unstable and unpredictable environments. For that reason, the search for a more strategic, systematic approach t...
Arjen Wassenaar, Shirley Gregor
ASUNAM
2011
IEEE
12 years 9 months ago
Visualizing Bibliographic Databases as Graphs and Mining Potential Research Synergies
—Bibliographic databases are a prosperous field for data mining research and social network analysis. They contain rich information, which can be analyzed across different dimen...
Iraklis Varlamis, George Tsatsaronis
IUI
2004
ACM
14 years 2 months ago
Handling device diversity through multi-level stylesheets
With the advent of in-home networking and ubiquitous computing, it becomes apparent that we have an increasing need for automatic adaptation of user interfaces to different device...
Walter Dees
POLICY
2004
Springer
14 years 2 months ago
A Goal-based Approach to Policy Refinement
As the interest in using policy-based approaches for systems management grows, it is becoming increasingly important to develop methods for performing analysis and refinement of p...
Arosha K. Bandara, Emil Lupu, Jonathan D. Moffett,...