Sciweavers

15375 search results - page 83 / 3075
» cans 2008
Sort
View
COMPSEC
2004
181views more  COMPSEC 2004»
13 years 7 months ago
The 10 deadly sins of information security management
This paper identifies 10 essential aspects, which, if not taken into account in an information security governance plan, will surely cause the plan to fail, or at least, cause seri...
Sebastiaan H. von Solms, Rossouw von Solms
CONCURRENCY
2004
90views more  CONCURRENCY 2004»
13 years 7 months ago
Programming and coordinating Grid environments and applications
The heterogeneous and dynamic nature of Grid environments place new demands on models and paradigms for parallel programming. In this work we discuss how ALua, a programming syste...
Cristina D. Ururahy, Noemi de La Rocque Rodriguez
COR
2004
115views more  COR 2004»
13 years 7 months ago
Evaluation of decision trees: a multi-criteria approach
Data mining (DM) techniques are being increasingly used in many modern organizations to retrieve valuable knowledge structures from organizational databases, including data wareho...
Kweku-Muata Osei-Bryson
CN
2002
86views more  CN 2002»
13 years 7 months ago
MSL: a model for W3C XML Schema
MSL (Model Schema Language) is an attempt to formalize some of the core idea in XML Schema. The benefits of a formal description is that it is both concise and precise. MSL has al...
Allen Brown, Matthew Fuchs, Jonathan Robie, Philip...
DAM
2002
280views more  DAM 2002»
13 years 7 months ago
On the Frame-Stewart algorithm for the multi-peg Tower of Hanoi problem
It is proved that seven different approaches to the multi-peg Tower of Hanoi problem are all equivalent. Among them the classical approaches of Stewart and Frame from 1941 can be ...
Sandi Klavzar, Uros Milutinovic, Ciril Petr