Sciweavers

419 search results - page 49 / 84
» Three Case Studies of Large-Scale Data Flows
Sort
View
CSFW
2008
IEEE
13 years 9 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers
EAI
2004
13 years 9 months ago
Integrating Product Catalogs via Multi-language Ontologies
A vertically integrated market consists of potentially competing companies who supply each other with products and services. Information technology can be employed to improve the b...
Manfred A. Jeusfeld
ISJ
2002
212views more  ISJ 2002»
13 years 7 months ago
Assessing and managing the benefits of enterprise systems: the business manager's perspective
This paper focuses on the benefits that organizations may achieve from their investment in enterprise systems (ES). It proposes an ES benefit framework for summarizing benefits in ...
Shari Shang, Peter B. Seddon
JOI
2010
101views more  JOI 2010»
13 years 6 months ago
Can epidemic models describe the diffusion of topics across disciplines?
This paper introduces a new approach to describe the spread of research topics across disciplines using epidemic models. The approach is based on applying individual-based models ...
Istvan Z. Kiss, Mark Broom, Paul G. Craze, Ismael ...
CLUSTER
2009
IEEE
14 years 2 months ago
Utility analysis for Internet-oriented server consolidation in VM-based data centers
—Server consolidation based on virtualization technology will simplify system administration, reduce the cost of power and physical infrastructure, and improve utilization in tod...
Ying Song, Yanwei Zhang, Yuzhong Sun, Weisong Shi