Sciweavers

210 search results - page 33 / 42
» Strategies for successful CRM implementation
Sort
View
AISM
2004
13 years 9 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
CONSTRAINTS
2008
95views more  CONSTRAINTS 2008»
13 years 7 months ago
Efficient Sequence Alignment with Side-Constraints by Cluster Tree Elimination
Aligning DNA and protein sequences is a core technique in molecular biology. Often, it is desirable to include partial prior knowledge and conditions in an alignment. Going beyond...
Sebastian Will, Anke Busch, Rolf Backofen
ENGL
2008
153views more  ENGL 2008»
13 years 7 months ago
Neural Network NARMA Control of a Gyroscopic Inverted Pendulum
The objective herein is to demonstrate the feasibility of a real-time digital control of an inverted pendulum for modeling and control, with emphasis on nonlinear auto regressive m...
F. Chetouane, S. Darenfed
ISI
2006
Springer
13 years 7 months ago
Towards Optimal Police Patrol Routes with Genetic Algorithms
It is quite consensual that police patrolling can be regarded as one of the best well-known practices for implementing public-safety preventive policies towards the combat of an as...
Danilo Reis, Adriano Melo, André L. V. Coel...
IJNSEC
2007
157views more  IJNSEC 2007»
13 years 7 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai