Sciweavers

63 search results - page 7 / 13
» Managing E-Mail Overload: Solutions and Future Challenges
Sort
View
MONET
2007
194views more  MONET 2007»
13 years 7 months ago
Pervasive Healthcare and Wireless Health Monitoring
With an increasingly mobile society and the worldwide deployment of mobile and wireless networks, the wireless infrastructure can support many current and emerging healthcare appli...
Upkar Varshney
CHIMIT
2009
ACM
14 years 2 months ago
A case study of enterprise identity management system adoption in an insurance organization
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 6 months ago
Service Level Agreement (SLA) in Utility Computing Systems
In recent years, extensive research has been conducted in the area of Service Level Agreement (SLA) for utility computing systems. An SLA is a formal contract used to guarantee th...
Linlin Wu, Rajkumar Buyya
ISF
2008
92views more  ISF 2008»
13 years 7 months ago
Information technology workforce skills: The software and IT services provider perspective
It is now commonplace for an organization to turn to external firms for the provision of IT services and software. As technology advances and the business environment continues to ...
Tim Goles, Stephen Hawk, Kate M. Kaiser
BPM
2007
Springer
165views Business» more  BPM 2007»
13 years 11 months ago
Modeling Requirements for Value Configuration Design
Breadth and depth complexity are key challenges in achieving business process fusion as the enabler for value configuration design. The PARM framework is proposed as the requiremen...
Eng Chew, Igor Hawryszkiewycz, Michael Soanes