Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
—The term Enterprise 2.0 applies to the use of Web 2.0 technologies as a support for business activities within the organizations. These technologies are exploited to foster inte...
Nicola Capuano, Matteo Gaeta, Francesco Orciuoli, ...
Currently supportive information systems for higher education and research are responding to specific information needs within institutes, departments and administration. These se...
Stefan Klink, Andreas Oberweis, Daniel Ried, Ralf ...
The high cost of data consolidation is the key market inhibitor to the adoption of traditional information integration and data warehousing solutions. In this paper, we outline a n...
Paul Brown, Peter J. Haas, Jussi Myllymaki, Hamid ...
Understanding and meeting the needs of a broad range of music users across different cultures and languages are central in designing a global music digital library. This explorato...
Jin Ha Lee, J. Stephen Downie, Sally Jo Cunningham