<--- Back to Details
First PageDocument Content
Software architecture / Software development / Information engineering / Enterprise engineering / Zachman Framework / Software development methodology / Enterprise integration / Enterprise architect / Business process management / Information technology management / Enterprise architecture / Enterprise modelling
Date: 2014-03-26 21:27:02
Software architecture
Software development
Information engineering
Enterprise engineering
Zachman Framework
Software development methodology
Enterprise integration
Enterprise architect
Business process management
Information technology management
Enterprise architecture
Enterprise modelling

IES: Strategic Modeling Phase

Add to Reading List

Source URL: www.ies.aust.com

Download Document from Source Website

File Size: 66,63 KB

Share Document on Facebook

Similar Documents

Computing / Software / Computer architecture / Smartphones / Cloud clients / Personal computing / Android / Benchmark / Google Play / HERE WeGo / IOS / BlackBerry Priv

Towards Measuring Real-World Performance of Android Devices Pascal Bissig, Gino Brunner, Florian Gubler, Roger Wattenhofer, Andreas Zingg Department of Electrical Engineering and Information Technology ETH Zurich, Switze

DocID: 1xVaz - View Document

Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

DocID: 1xUTK - View Document

Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

DocID: 1xUT1 - View Document

Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

DocID: 1xUGX - View Document

Music / Computer music / Learning / Artificial intelligence / Unsupervised learning / Machine learning / Cognitive science / Generative adversarial network / Generative model / Artificial neural network / Synthesizer / Algorithmic composition

Symbolic Music Genre Transfer with CycleGAN Gino Brunner, Yuyi Wang, Roger Wattenhofer and Sumu Zhao* Department of Information Technology and Electrical Engineering ETH Z¨urich Switzerland brunnegi,yuwang,wattenhofer,s

DocID: 1xUni - View Document