Sciweavers

1049 search results - page 89 / 210
» Change Management in Large-Scale Enterprise Information Syst...
Sort
View
JTAER
2006
100views more  JTAER 2006»
15 years 1 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
EUROSSC
2006
Springer
15 years 5 months ago
Discovery and Composition of Services for Context-Aware Systems
We consider the challenge of dynamically adapting services to context changes that occur in ubiquitous computing environments (e.g., changes in a user's activity) and propose ...
Cristian Hesselman, Andrew Tokmakoff, Pravin Pawar...
JDCTA
2008
206views more  JDCTA 2008»
15 years 1 months ago
An Application Strategy for PLM in Construction Industry
There are many interests and researches among an industry as IT develops. It is important to use information effectively and adequately as applying IT to industry because IT provi...
Kyung-Min Min, Nam-Hyuk Ham, Ju-Hyung Kim, Yoon-Su...
CCS
2010
ACM
15 years 8 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
FGCN
2008
IEEE
175views Communications» more  FGCN 2008»
15 years 8 months ago
Safeguard Intranet Using Embedded and Distributed Firewall System
Due to the impact of the rapid popularization of Internet and e-commerce, most organizations and enterprises take great effort to protect their information systems against malicio...
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-...