Sciweavers

35 search results - page 7 / 7
» The Purdue Enterprise Reference Architecture
Sort
View
JODS
2007
138views Data Mining» more  JODS 2007»
13 years 11 months ago
A Formal Framework for Adaptive Access Control Models
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
EDBT
2009
ACM
218views Database» more  EDBT 2009»
14 years 5 months ago
Data integration flows for business intelligence
Business Intelligence (BI) refers to technologies, tools, and practices for collecting, integrating, analyzing, and presenting large volumes of information to enable better decisi...
Umeshwar Dayal, Malú Castellanos, Alkis Sim...
INFOCOM
2003
IEEE
14 years 4 months ago
Integrity for Virtual Private Routed Networks
Abstract— The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and ...
Randy Bush, Timothy Griffin
LEGE
2003
107views Education» more  LEGE 2003»
14 years 10 days ago
Design Considerations for an ELeGI Portal
ELeGI, the European Learning Grid Infrastructure, has the ambitious goal of fostering effective learning and knowledge construction through the dynamic provision of service-based ...
Colin Allison, Rosa Michaelson
IC
2010
13 years 9 months ago
Cloud Computing - The Next Revolution in Information Technology
: Computing is being transformed to a model consisting of services that are commoditised and delivered in a manner similar to utilities such as water, electricity, gas, and telepho...
Rajkumar Buyya