Sciweavers

2710 search results - page 212 / 542
» Knowledge Management with Snapshots
Sort
View
BIS
2009
112views Business» more  BIS 2009»
15 years 2 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri
ELECTRONICMARKETS
2010
120views more  ELECTRONICMARKETS 2010»
15 years 1 months ago
Has the web transformed experience goods into search goods?
Klein (Journal of Business Research 41(3): 195
Makoto Nakayama, Norma G. Sutcliffe, Yun Wan
SEAFOOD
2007
Springer
15 years 10 months ago
Questionnaire-Based Risk Assessment Scheme for Japanese Offshore Software Outsourcing
Abstract. As the volumes of software development increase and the cost reduction is required, most Japanese IT companies are interested in offshore software outsourcing. Although a...
Hiroshi Tsuji, Akito Sakurai, Kenichi Yoshida, Amr...
SPATIALCOGNITION
2000
Springer
15 years 8 months ago
Schematic Maps for Robot Navigation
An approach to high-level interaction with autonomous robots by means of schematic maps is outlined. Schematic maps are knowledge representation structures to encode qualitative s...
Christian Freksa, Reinhard Moratz, Thomas Barkowsk...
CCE
2007
15 years 5 months ago
Product Based Interoperability - Approaches and Requirements
: Product data, information and knowledge are the core ICT resources for collaborative design. This paper describes five different approaches to exchanging and sharing product data...
Håvard D. Jørgensen, Dag Karlsen, Fra...