By Topic

IT Professional

Issue 2 • Date Mar/Apr 2003

Filter Results

Displaying Results 1 - 7 of 7
  • Evolution on the network edge: intelligent devices

    Publication Year: 2003, Page(s):32 - 36
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    A network's edge is arguably one of its most important areas, because this is where it delivers services to network users-or, from the Internet service provider perspective, to subscribers. Devices at the network's edge classify, prioritize, and mark packets for the rest of the network to understand, and ultimately allow them into the network. Given modern networks' complex internetworking, it is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Babylon project: toward an extensible text-mining platform

    Publication Year: 2003, Page(s):23 - 30
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (667 KB) | HTML iconHTML

    GlaxoSmithKline committed to adopting Verity, an indexing and search engine, to retrieve knowledge within the company intranet. Verity was attractive because it supported taxonomy-oriented browsing and concept-enhanced search. To tap the power in Verity's features, GlaxoSmithKline's Data Exploration Sciences began the Babylon project in late 2002 with two primary goals: develop a text-mining platf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML strategies for legacy database search

    Publication Year: 2003, Page(s):16 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (518 KB) | HTML iconHTML

    Over the past few years, XML (Extensible Markup Language) has become the standard for data and document interchange between distributed systems. With the continuing proliferation of the Internet, XML has also become a key technology for transactional e-business. A large percentage of Internet interactions, however, involves searching through documents, Web pages, databases, and other information r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 9-11 information failures: a semiotic approach

    Publication Year: 2003, Page(s):64, 61 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    The events leading to 11 September 2001 seem to indicate an interaction of oversights, which, in concert, compromised security. Here, we use a semiotic model to explain some of what went wrong prior to 9-11. Semiotics involves the study of signs and symbols to better understand their meaning and contextual relation. We begin with so-called information. For information to be useful, it must be nece... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalizing Web sites with mixed-initiative interaction

    Publication Year: 2003, Page(s):9 - 15
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (587 KB) | HTML iconHTML

    Personalization refers to the automatic adjustment of information content, structure, and presentation tailored to an individual user. Commercial Web sites increasingly employ personalization to help retain customers and reduce information overload. A Web site is personalized if a user can interact with the site in an expressive way to achieve his information-seeking goals. Thus, personalizing the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction to object-oriented systems engineering.1

    Publication Year: 2003, Page(s):38 - 42
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Within software development, object-oriented (OO) analysis provides an incremental and iterative approach to guide the requirements definition, design, and development of software-intensive systems. OO analysis uses the Unified Modeling Language (UML) to capture and represent these requirements. UML permits specification of the product independent of programming language or development process. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Who is collecting your Java garbage?

    Publication Year: 2003, Page(s):44 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (775 KB) | HTML iconHTML

    Garbage collection can really drain a Java system. Understanding the different GC algorithms your JVM might use is the first step toward improving system efficiency. This article summarizes current technologies of GC techniques implemented in most available Java platforms and discusses future trends in this discipline. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services