Sciweavers

7651 search results - page 47 / 1531
» Information integration in the enterprise
Sort
View
IAW
2003
IEEE
14 years 2 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
EDOC
2006
IEEE
14 years 3 months ago
Enterprise Computing Systems as Information Factories
The analysis, and eventual approval or rejection, of new enterprise information technology (IT) initiatives often proceeds on the basis of informal estimates of return on investme...
K. Mani Chandy, Lu Tian, Daniel M. Zimmerman
SIGMOD
2010
ACM
211views Database» more  SIGMOD 2010»
14 years 1 months ago
Enterprise information extraction: recent developments and open challenges
Information extraction (IE) — the problem of extracting structured information from unstructured text — has become an increasingly important topic in recent years. A SIGMOD 20...
Laura Chiticariu, Yunyao Li, Sriram Raghavan, Fred...
HICSS
2008
IEEE
95views Biometrics» more  HICSS 2008»
14 years 3 months ago
Enterprise Information Systems and Strategic Flexibility
Strategic flexibility is a critical organizational competency in today’s dynamic global environment. This paper explores the impact of enterprise information systems on an organ...
William MacKinnon, Gerald Grant, David Cray
HICSS
2007
IEEE
122views Biometrics» more  HICSS 2007»
14 years 3 months ago
Enterprise Information Architecture (EIA): Assessment of Current Practices in Malaysian Organizations
In this paper we described the findings based on a research study on current Enterprise Information Architecture (EIA) practices in Malaysian organizations. Ten organizations from...
Rafidah Abd. Razak, Zulkhairi Md. Dahalin, Rohaya ...