Sciweavers

305 search results - page 38 / 61
» From External to Internal Regret
Sort
View
ICEB
2004
158views Business» more  ICEB 2004»
13 years 9 months ago
E-Business Adoption in Marketing and Its Relationship with Factors in SWOT Analysis: an Empirical Investigation of Small Softwar
This research gives empirically grounded insights into e-business adoption in conjunction with factors usually considered in SWOT (Strengths, Weaknesses, Opportunities, and Threat...
Edward Bernroider, Alexander Hampel
ECIS
2003
13 years 9 months ago
The value of business intelligence in the context of developing countries
In the corporate context, a combination of constant technological innovation and increasing competitiveness makes the management of information a huge challenge and requires decis...
Maira Petrini, Marlei Pozzebon
CLEIEJ
1998
134views more  CLEIEJ 1998»
13 years 7 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
JCC
2002
67views more  JCC 2002»
13 years 7 months ago
Quasi-degenerate perturbation theory with general multiconfiguration self-consistent field reference functions
: The quasi-degenerate perturbation theory (QDPT) with complete active space (CAS) self-consistent field (SCF) reference functions is extended to the general multiconfiguration (MC...
Haruyuki Nakano, Ryuma Uchiyama, Kimihiko Hirao
ICRA
2010
IEEE
128views Robotics» more  ICRA 2010»
13 years 6 months ago
Detecting anomalies in unmanned vehicles using the Mahalanobis distance
The use of unmanned autonomous vehicles is becoming more and more significant in recent years. The fact that the vehicles are unmanned (whether autonomous or not), can lead to gre...
Raz Lin, Eliahu Khalastchi, Gal A. Kaminka