<--- Back to Details
First PageDocument Content
Enterprise modelling / Enterprise architecture / Software development process / Database management systems / Data modeling tools / Information engineering / Enterprise Architect / Data modeling / Data model / Software development / Software / Information technology management
Date: 2012-09-17 09:46:39
Enterprise modelling
Enterprise architecture
Software development process
Database management systems
Data modeling tools
Information engineering
Enterprise Architect
Data modeling
Data model
Software development
Software
Information technology management

Microsoft Word - Copyright

Add to Reading List

Source URL: www.visible.com

Download Document from Source Website

File Size: 111,29 KB

Share Document on Facebook

Similar Documents

Computing / Software / Computer architecture / Smartphones / Cloud clients / Personal computing / Android / Benchmark / Google Play / HERE WeGo / IOS / BlackBerry Priv

Towards Measuring Real-World Performance of Android Devices Pascal Bissig, Gino Brunner, Florian Gubler, Roger Wattenhofer, Andreas Zingg Department of Electrical Engineering and Information Technology ETH Zurich, Switze

DocID: 1xVaz - View Document

Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

DocID: 1xUTK - View Document

Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

DocID: 1xUT1 - View Document

Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

DocID: 1xUGX - View Document

Music / Computer music / Learning / Artificial intelligence / Unsupervised learning / Machine learning / Cognitive science / Generative adversarial network / Generative model / Artificial neural network / Synthesizer / Algorithmic composition

Symbolic Music Genre Transfer with CycleGAN Gino Brunner, Yuyi Wang, Roger Wattenhofer and Sumu Zhao* Department of Information Technology and Electrical Engineering ETH Z¨urich Switzerland brunnegi,yuwang,wattenhofer,s

DocID: 1xUni - View Document