Sciweavers

2742 search results - page 491 / 549
» Business Service Scheduling
Sort
View
ACSW
2006
13 years 11 months ago
Analysis of traceback techniques
Today's Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is tremendous pressure on the sites performing online business and ISP's ...
Udaya Kiran Tupakula, Vijay Varadharajan
ECIS
2004
13 years 11 months ago
Consequences of implementing knowledge management initiatives in different organizational subcultures
Organizations implementing knowledge management (KM) initiatives are concerned with promoting sharing and transferring of knowledge, within and across different organizational uni...
Ravi Shankar Mayasandra, Shan Ling Pan
DBSEC
2006
124views Database» more  DBSEC 2006»
13 years 11 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
ECEH
2006
168views Healthcare» more  ECEH 2006»
13 years 11 months ago
Building a Smart Hospital using RFID Technologies
: Technologies of identification by radio frequencies (RFID) experience a fast development and healthcare is predicted to be one of its major growth areas. After briefly introducin...
Patrik Fuhrer, Dominique Guinard
IADIS
2004
13 years 11 months ago
A Model of E-Commerce for the Highly Valuable Traditional Products in Thailand
As e-commerce is considered an excellent alternative for business to reach new customers, interests in design principles for e-commerce websites, are increasing. However, not many...
Sakuna Vanichvisuttikul, Chamnong Jungthirapanich