Sciweavers

59 search results - page 5 / 12
» dexaw 2005
Sort
View
DEXAW
2005
IEEE
161views Database» more  DEXAW 2005»
14 years 3 months ago
Adding Semantics to Business Intelligence
  Despite  the  importance  of  analytical  tools  to  organisations,  they  still  lack  the  inference  power  needed to  solve the requests of decision mak...
Denilson Sell, Liliana Cabral, Enrico Motta, John ...
DEXAW
2005
IEEE
164views Database» more  DEXAW 2005»
14 years 3 months ago
Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms
This paper addresses the specification of security modules in a Mobile Digital Rights Management (DRM) approach with a focus on copy detection mechanisms. The presented DRM approa...
Miguel Soriano, Stephan Flake, Jürgen Tacken,...
DEXAW
2005
IEEE
197views Database» more  DEXAW 2005»
14 years 3 months ago
Enhanced Business Intelligence - Supporting Business Processes with Real-Time Business Analytics
In the 21st century, organizations are experiencing environmental changes characterized by indistinct organizational boundaries and fast-paced change. As a result firms need appro...
Andreas Seufert, Josef Schiefer
DEXAW
2005
IEEE
96views Database» more  DEXAW 2005»
14 years 3 months ago
Mining Complex Patterns from Protein Surfaces
In the domain of bioinformatics, the role played in the biological process by proteins, that act as transmitters and receivers of information thus ruling the mechanisms that deter...
Lorenzo Baldacci, Matteo Golfarelli
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
14 years 3 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner