Sciweavers

1173 search results - page 155 / 235
» Identifying Successful Telecommuters
Sort
View
ICEIS
2007
IEEE
15 years 7 months ago
An information systems auditor's profile
The increasing dependence upon Information systems in the last few decades by businesses has resulted in concerns regarding auditing. IS auditing has changed from auditing “arou...
Mariana Carroll, Alta van der Merwe
IMC
2007
ACM
15 years 6 months ago
Inferring subnets in router-level topology collection studies
Internet measurement studies require availability of representative topology maps. Depending on the map resolution (e.g., autonomous system level or router level), the procedure o...
Mehmet Hadi Gunes, Kamil Saraç
ASUNAM
2010
IEEE
15 years 6 months ago
A Unified Framework for Link Recommendation Using Random Walks
The phenomenal success of social networking sites, such as Facebook, Twitter and LinkedIn, has revolutionized the way people communicate. This paradigm has attracted the attention ...
Zhijun Yin, Manish Gupta, Tim Weninger, Jiawei Han
BIS
2008
130views Business» more  BIS 2008»
15 years 6 months ago
Employee Competencies for Business Process Management
Business process management (BPM) is an approach which empowers companies to react flexibly to new market situations. The main goal of BPM is to improve efficiency and effectivenes...
Stefan Eicker, Jessica Kochbeck, Peter M. Schuler
DBSEC
2007
112views Database» more  DBSEC 2007»
15 years 6 months ago
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments
Abstract. The event-condition-action (ECA) paradigm holds enormous potential in pervasive computing environments. However, the problem of reliable delivery of event data, generated...
Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ra...