Sciweavers

669 search results - page 125 / 134
» Managing the Risk of IT Outsourcing
Sort
View
COOPIS
2003
IEEE
14 years 1 months ago
Static Type-Inference for Trust in Distributed Information Systems
Abstract. Decision-makers in critical fields such as medicine and finance make use of a wide range of information available over the Internet. Mediation, a data integration techn...
Premkumar T. Devanbu, Michael Gertz, Brian Toone
PFE
2001
Springer
14 years 26 days ago
Easing the Transition to Software Mass Customization
Although software mass customization offers the potential for order-of-magnitude improvements in software engineering performance, the up-front cost, level of effort, assumed risk,...
Charles W. Krueger
DIM
2007
ACM
14 years 11 days ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
WSC
2004
13 years 9 months ago
"One" a New Tool for Supply Chain Network Optimization and Simulation
Nowadays, in a hotly competitive environment, companies are continuously trying to provide products and/or services to customers faster, cheaper, and better than the competitors d...
Hongwei Ding, Lyès Benyoucef, Xiaolan Xie, ...
LISA
2003
13 years 9 months ago
DryDock: A Document Firewall
Auditing a web site’s content is an arduous task. For any given page on a web server, system administrators are often ill-equipped to determine who created the document, why it...
Deepak Giridharagopal