Items where Division is "College of Computing" and Year is 2005

Group by: Creators | Item Type | No Grouping
Number of items: 5.

Abdallah, Ali E. and Khayat, Etienne J. (2005) A Formal Model for Parameterized Role-Based Access Control. In: Formal Aspects in Security and Trust. Springer, pp. 233-246. ISBN 978-0-387-24050-3

Chibelushi, C. and Shah, H. and Sharp, B. (2005) ASKARI: CrimeText mining. In: IRM Press. CyberTech Publishing, and Idea Group.

Dong, D. and Golder, P. and Sharp, B. and Shah, H. (2005) Application of Semantic Analysis Method (SAM) to the Design of an On-line Portal. In: The 2nd International Conference on E-Business and Telecommunication Networks (RESIDE), Microsoft Convention Centre, Reading, UK.

Sharp, P. and Eardley, W.A. and Shah, H. (2005) Visual Tools within Make - A Knowledge Management Method. Electronic Journal on Knowledge Management, 1 (2).

Sharp, P. and Simm, M. and Eardley, W.A. and Shah, H. (2005) MaKE First Steps - a Practical Approach to Collaboratively Defining Knowledge in Organisations. In: ICICKM 2005.

This list was generated on Thu Oct 24 15:31:31 2024 UTC.

Research

In this section...