Sciweavers

669 search results - page 100 / 134
» Managing the Risk of IT Outsourcing
Sort
View
EMISA
2005
Springer
14 years 2 months ago
Unbundling and Deploying CRM Applications as e-Services
: The development of Customer Relationship Management (CRM) capabilities by incrementally sourcing and combining “best of breed” services from different providers is a key leve...
Pedro R. Falcone Sampaio, Yong He
ISCIS
2005
Springer
14 years 2 months ago
A Secure Communication Framework for Mobile Agents
Abstract. Communication, a fundamental concept in computing, allows two pieces of software to interact and to exchange information. It is an important aspect of mobile agent system...
Suat Ugurlu, Nadia Erdogan
ITRUST
2005
Springer
14 years 2 months ago
Security and Trust in the Italian Legal Digital Signature Framework
Abstract. The early adoption of a national, legal digital signature framework in Italy has brought forth a series of problems and vulnerabilities. In this paper we describe each of...
Stefano Zanero
MLDM
2005
Springer
14 years 2 months ago
A Grouping Method for Categorical Attributes Having Very Large Number of Values
In supervised machine learning, the partitioning of the values (also called grouping) of a categorical attribute aims at constructing a new synthetic attribute which keeps the info...
Marc Boullé
GCC
2004
Springer
14 years 1 months ago
Trust Establishment in Large Scale Grid Settings
Trust establishment is hard in grid architecture by the ad hoc nature. To set up trust in large scale of network is more difficult. In this paper, we propose an automatic key manag...
Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhall...