Sciweavers

3149 search results - page 169 / 630
» IT security risk management
Sort
View
IFSA
2007
Springer
138views Fuzzy Logic» more  IFSA 2007»
14 years 3 months ago
Optimization to Manage Supply Chain Disruptions Using the NSGA-II
Disruption on a supply chain provokes lost that should be minimized looking for alternative suppliers. This solution involves a strategy to manage the impact of the disruption and ...
Víctor Serrano, Matías Alvarado, Car...
HICSS
2002
IEEE
80views Biometrics» more  HICSS 2002»
14 years 2 months ago
EasyWinWin: Managing Complexity in Requirements Negotiation with GSS
More than ¾ of large software projects suffer large cost and schedule overruns or fail outright. Deficits in project requirements cause more than half of these failures and overr...
Robert O. Briggs, Paul Grünbacher
EOR
2008
200views more  EOR 2008»
13 years 9 months ago
A dynamic stochastic programming model for international portfolio management
We develop a multi-stage stochastic programming model for international portfolio management in a dynamic setting. We model uncertainty in asset prices and exchange rates in terms...
Nikolas Topaloglou, Hercules Vladimirou, Stavros A...
SAC
2008
ACM
13 years 8 months ago
Workflow management versus case handling: results from a controlled software experiment
Business Process Management (BPM) technology has become an important instrument for improving process performance. When considering its use, however, enterprises typically have to...
Bela Mutschler, Barbara Weber, Manfred Reichert
AIMS
2008
Springer
13 years 11 months ago
A Role-Based Infrastructure for the Management of Dynamic Communities
Abstract. This paper addresses the problem of specifying and establishing secure collaborations between autonomous entities that need to interact and depend on each other in order ...
Alberto E. Schaeffer Filho, Emil Lupu, Morris Slom...