Sciweavers

5333 search results - page 908 / 1067
» Business
Sort
View
ISI
2008
Springer
15 years 4 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
IJKL
2006
57views more  IJKL 2006»
15 years 4 months ago
MBA knowledge management course: is there an impact after graduation?
: The purpose of this paper is twofold. The first is to present the structure of a course entitled `Strategic Knowledge Management' taught at the MBA level at the DeGroote Sch...
Nick Bontis, Alexander Serenko, Ernest Biktimirov
IJSEKE
2006
138views more  IJSEKE 2006»
15 years 4 months ago
Towards Automatic Establishment of Model Dependencies Using Formal Concept Analysis
tion and alteration of software models at different levels of abstraction. These modifications are usually performed independently, but the objects to which they are applied to, ar...
Igor Ivkovic, Kostas Kontogiannis
IJSN
2006
87views more  IJSN 2006»
15 years 4 months ago
Workflow authorisation in mediator-free environments
: WorkFlow Management Systems (WFMS) coordinate and streamline business processes. Acquiring workflow authorisations and managing workflow authorisation constraints is achallenging...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor
JCM
2008
101views more  JCM 2008»
15 years 4 months ago
WiMAX: The Innovative Broadband Wireless Access Technology
The telecommunication industry has been through disruptive times, but data networking service revenue has continued to rise. The telecom industry is expected to continue to grow as...
Abdulrahman Yarali, Saifur Rahman, Bwanga Mbula