author: ernesto damiani

The Open Knowledge Society: A Computer Science and Information Systems Manifesto

... Emirates.com. Most sites did not offer alternative methods of payment except from credit cards. Moreover, almost all sites did not offer both forms of ticketing (paper ticket and e-ticket). These insufficiencies should be resolved and ...

Data and Applications Security XX: 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings

... Michael T. Goodrich1, Roberto Tamassia2, and Danfeng Yao2 1 Department of Computer Science, University of California 2 Irvine, CA 92697 USA goodrich@acm.org Department of Computer Science, Brown University Providence, RI 02912 USA {rt ...

Agile Processes in Software Engineering and Extreme Programming: 8th International Conference, XP 2007, Como, Italy, June 18-22, 2007, Proceedings

... Case Study on Automated Static Code Analysis Artem Marchenko1 and Pekka Abrahamsson2 1 Nokia, Hatanpäänkatu 1, FIN-33100 Tampere, Finland 2 VTT Technical Research Centre of Finland, P.O.Box 1100, FIN-90571 Oulu, Finland artem.marchenko@ ...

Human-Centered e-Business

... cross - functional systems as well as functional systems . Cross- functional enterprise ... Enterprise Resource Planning ( ERP ) and Customer Relationship Management ... system to track " the status of sales , inventory , and invoicing as well ...

Visioning and Engineering the Knowledge Society - A Web Science Perspective: Second World Summit on the Knowledge Society, WSKS 2009, Chania, Crete, Greece, September 16-18, 2009. Proceedings

... Deresky, H.: International Management. Managing Across Borders and Cultures – Text and Cases, 6th edn. Pearson Education Inc., London (2008) 6. Davenport, T.H.: Saving IT's Soul: Human-Centered Information Management. Harvard Business ...

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXIX: Special Issue on Database- and Expert-Systems Applications

... ETL workflow. Historically, these studies have been proposed and discussed ... templates and taxonomies. They considered the sources at the M1 level of the MOF. In ... Mapping modeling [7,18] also have been proposed. Due to the similarity ...

Open Source Systems: IFIP Working Group 2.13 Foundation on Open Source Software, June 8-10, 2006, Como, Italy

... project that aims at defining an Open Source Software ( OSS ) policy in the field of Air Traffic Management ( ATM ) . In order to develop such a policy , we chose to investigate first a set of predictive hy- potheses . Our four initial ...

Trust Models for Next-Generation Blockchain Ecosystems

... models as a representation of the dApp's logic can be extended with a trust layer that deals with concepts such as uncertainty and trust [13]. Figure 1.3 shows a conceptualization of the ... Modeling Trust in Collaborative Business Processes.

Multimedia Techniques for Device and Ambient Intelligence

... point in 8D with normal ( nx , ny , nz ) and principal ( k1 , k2 ) ... ( CSS ) was introduced by Mokhtarian and Mackworth [ 23 ] [ 24 ] as a shape ... CSS technique was selected as a contour shape descriptor for MPEG - 7 [ 21 ] . To create a ...

Database and Expert Systems Applications: 28th International Conference, DEXA 2017, Lyon, France, August 28-31, 2017, Proceedings, Part II

... 3(9), 490–499 (1960) 5. Green, O., McColl, R., Bader, D.A.: GPU merge path: a GPU merging algorithm. In: Proceedings ... Gems 3. Addison Wesley, Boston (2007) 7. Hon, W.K., Ku, T.H., Shah, R., Thankachan, S.V., Vitter, J.S.: Faster ...

Open Source Systems: Adoption and Impact: 11th IFIP WG 2.13 International Conference, OSS 2015, Florence, Italy, May 16-17, 2015, Proceedings

... Diffusion of Innovations We are particularly interested in how these ... rate of diffusion, including characteristics of the community (or individuals) that would affect ... can be quite complex, especially with technologies that are themselves ...

Web 2.0: The Business Model

... Contabilidade e Administração do Porto (ISCAP) since 1992. He is co-author of four books in the area of informatics for personal productivity edited by Centro Atlântico. Isabel Ramos is an Assistant Professor at Information Systems ...

Open Source Development, Communities and Quality: IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, Milano, Italy

... ppt tions, London 10. Hinds N (2004) Kernel korner: The Linux test project. Linux Journal Test Suite. http://ltp.sourceforge.net/EAL3.html. Accessed December 2007 12. ISO/IEC. Guide for the production of Protection Pro_les and Security ...

Best Practices for the Knowledge Society. Knowledge, Learning, Development and Technology for All: Second World Summit on the Knowledge Society, WSKS 2009, Chania, Crete, Greece, September 16-18, 2009. Proceedings

... hotel industry. The re- search identifies the barriers which block organizational change effort. A sample of thirty hotels in the city of Athens was used.This paper presents a SWOT analysis of the hotel sector, identifying the strengths ...

Open Source Systems Security Certification

... (host) kernel a simulated computer environment, called virtual machine, where ... virtualization dates back to the 1960s,2 when it was employed to allow ... physical computing facilities from the execution environment expected by ...

Visioning and Engineering the Knowledge Society - A Web Science Perspective: Second World Summit on the Knowledge Society, WSKS 2009, Chania, Crete, Greece, September 16-18, 2009. Proceedings

... phase: it is constituted for the definition and construction of a stable data model and the implementation and implantation of HEODAR tool as a Moodle module. • Second phase: it concentrates the effort in the design and implementation ...

Computer Security: ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers

... file and folder and email encryption. Integration with Symantec Data Loss Prevention automatically encrypts sensitive data being moved onto removable media devices or residing in emails and files. Robust management features include ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.