Sciweavers

1049 search results - page 143 / 210
» Change Management in Large-Scale Enterprise Information Syst...
Sort
View
ISCA
2009
IEEE
148views Hardware» more  ISCA 2009»
15 years 6 months ago
Disaggregated memory for expansion and sharing in blade servers
Analysis of technology and application trends reveals a growing imbalance in the peak compute-to-memory-capacity ratio for future servers. At the same time, the fraction contribut...
Kevin T. Lim, Jichuan Chang, Trevor N. Mudge, Part...
ISF
2010
109views more  ISF 2010»
14 years 10 months ago
Collaborative systems development in disaster relief: The impact of multi-level governance
Disaster management information systems for international humanitarian relief are developed in contexts involving local, national and inter-governmental organizations together with...
Edgar A. Maldonado, Carleen F. Maitland, Andrea Ho...
SIGIR
2010
ACM
15 years 3 months ago
Temporal diversity in recommender systems
Collaborative Filtering (CF) algorithms, used to build webbased recommender systems, are often evaluated in terms of how accurately they predict user ratings. However, current eva...
Neal Lathia, Stephen Hailes, Licia Capra, Xavier A...
HICSS
2002
IEEE
143views Biometrics» more  HICSS 2002»
15 years 4 months ago
Business Intelligence in Healthcare Organizations
The management of healthcare organizations starts to recognize the relevance of the definition of care products in relation to management information. In the turmoil between costs...
Ton A. M. Spil, Robert A. Stegwee, Christian J. A....
SAC
2009
ACM
15 years 6 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni