Sciweavers

7651 search results - page 237 / 1531
» Information integration in the enterprise
Sort
View
DAMON
2006
Springer
14 years 2 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
GIL
2008
14 years 6 days ago
Adoption of Supply Chain Management in German Agrifood Networks
: Supply chain management has emerged as cross functional, cross company concept to improve coordination of entire value chains through coordinated actions of all companies. It has...
Melanie Fritz, Eva Schneemann, Gerhard Schiefer
CONEXT
2009
ACM
13 years 12 months ago
Macroscope: end-point approach to networked application dependency discovery
Enterprise and data center networks consist of a large number of complex networked applications and services that depend upon each other. For this reason, they are difficult to ma...
Lucian Popa 0002, Byung-Gon Chun, Ion Stoica, Jaid...
ACSAC
1999
IEEE
14 years 3 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
CHI
2002
ACM
14 years 11 months ago
Polyarchy visualization: visualizing multiple intersecting hierarchies
Hierarchy visualization has been a hot topic in the Information Visualization community for the last decade. An emerging new information structure is multiple intersecting hierarc...
George G. Robertson, Kim Cameron, Mary Czerwinski,...