Works matching DE "COMPUTER systems management"


Results: 71
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11

    Prediction of Business Failure with Fuzzy Models.

    Published in:
    International Journal of Uncertainty, Fuzziness & Knowledge-Based Systems, 2018, v. 26, p. 21, doi. 10.1142/S0218488518400020
    By:
    • Terceño, Antonio;
    • Vigier, Hernán;
    • Scherger, Valeria
    Publication type:
    Article
    12
    13
    14
    15
    16
    17

    A delegation model for extended RBAC.

    Published in:
    International Journal of Information Security, 2010, v. 9, n. 3, p. 209, doi. 10.1007/s10207-010-0104-3
    By:
    • Ben-Ghorbel-Talbi, Meriam;
    • Cuppens, Frédéric;
    • Cuppens-Boulahia, Nora;
    • Bouhoula, Adel
    Publication type:
    Article
    18
    19

    TRACEABLE IDENTITY-BASED GROUP SIGNATURE.

    Published in:
    RAIRO - Theoretical Informatics & Applications, 2016, v. 50, n. 3, p. 193, doi. 10.1051/ita/2016021
    By:
    • KE GU;
    • LIHAO YANG;
    • YONG WANG;
    • SHENG WEN
    Publication type:
    Article
    20
    21

    Acknowledgment to Reviewers.

    Published in:
    Journal of Network & Systems Management, 2015, v. 23, n. 1, p. 246, doi. 10.1007/s10922-014-9337-1
    Publication type:
    Article
    22

    Intrusion Detection by Ellipsoid Boundary.

    Published in:
    Journal of Network & Systems Management, 2010, v. 18, n. 3, p. 265, doi. 10.1007/s10922-010-9165-x
    By:
    • GhasemiGol, Mohammad;
    • Monsefi, Reza;
    • Sadoghi-Yazdi, Hadi
    Publication type:
    Article
    23
    24
    25
    26

    We Must Find the Courage to Change.

    Published in:
    Journal of Business Logistics, 2015, v. 36, n. 1, p. 9, doi. 10.1111/jbl.12078
    By:
    • Lambert, Douglas M.;
    • Enz, Matias G.
    Publication type:
    Article
    27
    28
    29
    30
    31

    AMUSE: autonomic management of ubiquitous e-Health systems.

    Published in:
    Concurrency & Computation: Practice & Experience, 2008, v. 20, n. 3, p. 277, doi. 10.1002/cpe.1194
    By:
    • Lupu, E.;
    • Dulay, N.;
    • Sloman, M.;
    • Sventek, J.;
    • Heeps, S.;
    • Strowes, S.;
    • Twidle, K.;
    • Keoh, S.-L.;
    • Schaeffer-Filho, A.
    Publication type:
    Article
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44

    IT Is Here to Serve.

    Published in:
    IT Professional, 2009, v. 11, n. 2, p. 42, doi. 10.1109/MITP.2009.30
    By:
    • W. KOlb, Todd
    Publication type:
    Article
    45
    46
    47
    48
    49
    50