Sciweavers

633 search results - page 63 / 127
» What's in a Service
Sort
View
ICSE
2003
IEEE-ACM
14 years 3 months ago
Achieving Critical System Survivability Through Software Architectures
Software-intensive systems often exhibit dimensions in size and complexity that exceed the scope of comprehension of even talented, experienced system designers and analysts. With ...
John C. Knight, Elisabeth A. Strunk
EUROMICRO
2002
IEEE
14 years 2 months ago
Comparing JavaBeans and OSGi Towards an Integration of Two Complementary Component Models
In today's software engineering practices, building applications from components is the ongoing trend. What can be noticed however is that there really is not a clear consens...
Humberto Cervantes, Jean-Marie Favre
HICSS
2002
IEEE
88views Biometrics» more  HICSS 2002»
14 years 2 months ago
An Empirical Study of the Use Contexts and Usability Problems in Mobile Internet
Mobile Internet, which is a combination of the Internet with mobile devices, has become popular recently. Mobile Internet is primarily different from stationary Internet in that i...
Hoyoung Kim, Jinwoo Kim, Yeonsoo Lee, Minhee Chae,...
BPM
2007
Springer
155views Business» more  BPM 2007»
14 years 2 months ago
Fuzzy Mining - Adaptive Process Simplification Based on Multi-perspective Metrics
Abstract. Process Mining is a technique for extracting process models from execution logs. This is particularly useful in situations where people have an idealized view of reality....
Christian W. Günther, Wil M. P. van der Aalst
ISSA
2008
13 years 11 months ago
The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research
Information Security awareness initiatives are seen as critical to any information security programme. But, how do we determine the effectiveness of these awareness initiatives? W...
Tony Stephanou, Rabelani Dagada