Sciweavers

5333 search results - page 1031 / 1067
» Business
Sort
View
JNW
2008
83views more  JNW 2008»
14 years 9 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
JOT
2008
108views more  JOT 2008»
14 years 9 months ago
Requirements analysis for large scale systems
All readers of this paper most likely have knowledge of the software requirements discipline and of the use case notation, however not everyone is aware that with the progress of ...
Roger Johnson, George Roussos, Luca Vetti Tagliati
JUCS
2008
118views more  JUCS 2008»
14 years 9 months ago
Enhancements of Meeting Information Management and Application for Knowledge Access and Learning Activities
: Communication processes have become increasingly important in modern working life. Organizations invest a surprisingly high amount of financial resources and employee work time i...
Christian Gütl
JUCS
2008
341views more  JUCS 2008»
14 years 9 months ago
IQM3: Information Quality Management Maturity Model
: In order to enhance their global business performance, organizations must be careful with the quality of their information since it is one of their main assets. Analogies to qual...
Ismael Caballero, Angelica Caro, Coral Calero, Mar...
82
Voted
DSS
2007
226views more  DSS 2007»
14 years 9 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
« Prev « First page 1031 / 1067 Last » Next »