Sciweavers

1061 search results - page 39 / 213
» Understanding Architectural Assets
Sort
View
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
14 years 3 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
GECCO
2005
Springer
158views Optimization» more  GECCO 2005»
14 years 2 months ago
A genetic algorithm approach to the selection of near-optimal subsets from large sets
The problem attempted in this paper is to select a sample from a large set where the sample is required to have a particular average property. The problem can be expressed as an o...
P. Whiting, P. W. Poon, J. N. Carter
CDVE
2004
Springer
113views Visualization» more  CDVE 2004»
14 years 2 months ago
Fostering Creativity in Cooperative Design
Creativity has become a valuable asset, given the fast paced changes most companies must nowadays deal with. Companies now look for creative, highly adaptive individuals who can ex...
Adriana Santarosa Vivacqua, Jano Moreira de Souza
ITNG
2010
IEEE
14 years 1 months ago
Applying Semantic Web Techniques to Reservoir Engineering: Challenges and Experiences from Event Modeling
—In reservoir engineering domain experts deal with many tasks and operations, ranging from reservoir simulation to well maintenance scheduling, with the goal of maximizing oil pr...
Tao Zhu, Amol Bakshi, Viktor K. Prasanna, Karthik ...
ACSAC
1998
IEEE
14 years 28 days ago
Role-Based Access Control Framework for Network Enterprises
A business's success depends on its ability to protect valuable business assets in an increasingly hostile environment. Protecting information requires a cost, not only in pu...
D. J. Thomsen, D. O'Brien, J. Bogle