Sciweavers

3686 search results - page 226 / 738
» Comprehensive comprehensions
Sort
View
DEXAW
2005
IEEE
172views Database» more  DEXAW 2005»
14 years 3 months ago
Business Process Management with Vague Data
Recent dynamics in the business world and the tough environment of globalization put enormous pressure on enterprises to be innovative. As a consequence, management concepts and I...
Oliver Thomas, Otmar Adam, Christian Seel
ESCIENCE
2005
IEEE
14 years 3 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
HICSS
2005
IEEE
140views Biometrics» more  HICSS 2005»
14 years 3 months ago
On Contamination in Information Ecosystems
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may inte...
Bengt Carlsson, Andreas Jacobsson
HICSS
2005
IEEE
176views Biometrics» more  HICSS 2005»
14 years 3 months ago
Architecture for Customer Relationship Management Approaches in Financial Services
The majority of financial services companies in Germany and Switzerland have, with varying objectives and success, conducted customer relationship management (CRM) implementation ...
Malte Geib, Annette Reichold, Lutz Kolbe, Walter B...
ICALT
2005
IEEE
14 years 3 months ago
Flexible and Exploratory Learning by Polyscopic Topic Maps
Flexible and active education calls for a comprehensive restructuring of the traditional university course format. Such restructuring can be done in a natural and coherent way by ...
Dino Karabeg, Rolf Guescini, Tommy W. Nordeng