Sciweavers

44 search results - page 8 / 9
» Logging key assurance indicators in business processes
Sort
View
JNW
2008
83views more  JNW 2008»
13 years 5 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
WIIW
2001
104views more  WIIW 2001»
13 years 6 months ago
Modeling Web Site Personalization Strategies
- Abstract Modeling web site personalization strategies. Personalization is a key factor for differentiating services and retaining customers in World Wide Web sites. On the other ...
Fabiana Ruas, Wagner Meira Jr., Paulo Araúj...
JORS
2010
134views more  JORS 2010»
13 years 4 days ago
An overview and framework for PD backtesting and benchmarking
In order to manage model risk, financial institutions need to set up validation processes so as to monitor the quality of the models on an ongoing basis. Validation can be conside...
G. Castermans, David Martens, Tony Van Gestel, B. ...
APSCC
2007
IEEE
13 years 11 months ago
Investigating the Potential of Service Oriented Architectures to Realize Dynamic Capabilities
The paradigm of service-oriented computing (SOC) has emerged as an architectural approach to flexibility and agility, not just in systems development but also in business process ...
Haresh Luthria, Fethi A. Rabhi, Michael Briers
ECIS
2003
13 years 6 months ago
An exploratory case study on IS implementation and organizational change in China
Owing to the turbulent and fast changing environment in which Chinese firms operate, Information Systems (IS) implementation triggers important organizational changes in these fir...
Huixian Li, John Lim, K. S. Raman