<--- Back to Details
First PageDocument Content
Enterprise modelling / Enterprise application integration / Enterprise architecture / Design / Information engineering / Service-oriented architecture / Business process modeling / Enterprise integration / Business process management / Information technology management / Software architecture / Management
Date: 2014-03-26 21:26:40
Enterprise modelling
Enterprise application integration
Enterprise architecture
Design
Information engineering
Service-oriented architecture
Business process modeling
Enterprise integration
Business process management
Information technology management
Software architecture
Management

IES Course: Enterprise Integration - Technologies and Strategies

Add to Reading List

Source URL: www.ies.aust.com

Download Document from Source Website

File Size: 63,72 KB

Share Document on Facebook

Similar Documents

Computing / Software / Computer architecture / Smartphones / Cloud clients / Personal computing / Android / Benchmark / Google Play / HERE WeGo / IOS / BlackBerry Priv

Towards Measuring Real-World Performance of Android Devices Pascal Bissig, Gino Brunner, Florian Gubler, Roger Wattenhofer, Andreas Zingg Department of Electrical Engineering and Information Technology ETH Zurich, Switze

DocID: 1xVaz - View Document

Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

DocID: 1xUTK - View Document

Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

DocID: 1xUT1 - View Document

Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

DocID: 1xUGX - View Document

Music / Computer music / Learning / Artificial intelligence / Unsupervised learning / Machine learning / Cognitive science / Generative adversarial network / Generative model / Artificial neural network / Synthesizer / Algorithmic composition

Symbolic Music Genre Transfer with CycleGAN Gino Brunner, Yuyi Wang, Roger Wattenhofer and Sumu Zhao* Department of Information Technology and Electrical Engineering ETH Z¨urich Switzerland brunnegi,yuwang,wattenhofer,s

DocID: 1xUni - View Document