Sciweavers

2710 search results - page 6 / 542
» Knowledge Management with Snapshots
Sort
View
MOBICOM
2010
ACM
13 years 8 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
JKM
2008
123views more  JKM 2008»
13 years 8 months ago
Knowledge, management, and knowledge management in business operations
Purpose
Fei Gao, Meng Li, Steve Clarke
ETS
2002
IEEE
144views Hardware» more  ETS 2002»
13 years 8 months ago
Creating Shared Knowledge: Instructional Knowledge Management Systems
Document management, information management, and knowledge management are three processes of an instructional knowledge management system (IKMS) that require different ways of thi...
Gerald S. Edmonds, Rob Pusch
JKM
2008
98views more  JKM 2008»
13 years 8 months ago
Inquiry in health knowledge management
Purpose
James Sheffield