Sciweavers

6952 search results - page 1257 / 1391
» The information integrity imperative
Sort
View
HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
14 years 4 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter
IEEESCC
2007
IEEE
14 years 4 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
INFOCOM
2007
IEEE
14 years 4 months ago
QoS-Driven Power Allocation Over Parallel Fading Channels With Imperfect Channel Estimations in Wireless Networks
— We propose the quality-of-service (QoS) driven power allocation schemes for parallel fading channels when considering imperfect channel estimations. In particular, the parallel...
Jia Tang, Xi Zhang
IROS
2007
IEEE
197views Robotics» more  IROS 2007»
14 years 4 months ago
Generic and systematic evaluation of haptic interfaces based on testbeds
— The purpose of evaluation procedures is to achieve both qualitative and quantitative statements on haptic rendering realism and performance. Since a haptic interface provides a...
Evren Samur, Fei Wang, Ulrich Spaelter, Hannes Ble...
CAISE
2007
Springer
14 years 3 months ago
Analyzing the Business of Software: A Modelling Technique for Software Supply Networks
Abstract. One of the most significant paradigm shifts of software business management is that individual organizations no longer compete as single entities but as complex dynamic ...
Slinger Jansen, Anthony Finkelstein, Sjaak Brinkke...
« Prev « First page 1257 / 1391 Last » Next »