Sciweavers

93 search results - page 10 / 19
» Managing with M-Commerce: A Case Study of NDC Limited
Sort
View
IWIA
2006
IEEE
15 years 3 months ago
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Ole Martin Dahl, Stephen D. Wolthusen
CIT
2006
Springer
15 years 1 months ago
Fuzzy data mining for customer loyalty analysis
One of the major conceptual analyses in analytical CRM is customer loyalty. Current methods use user defined and statistical methods for loyalty analysis. One of the major limitat...
Jay B. Simha, S. S. Iyengar
ICC
2007
IEEE
108views Communications» more  ICC 2007»
15 years 3 months ago
Flow Management for SIP Application Servers
—In this paper, we study how to build a front-end flow management system for SIP application servers. This is challenging because of some special characteristics of SIP and SIP a...
Jing Sun, Jinfeng Hu, Ruixiong Tian, Bo Yang
EMISA
2009
Springer
15 years 4 months ago
A Survival Analysis of Application Life Spans based on Enterprise Architecture Models
Abstract: Modern enterprises face the challenge to survive in an ever changing environment. One commonly accepted means to address this challenge and further enhance survivability ...
Stephan Aier, Sabine Buckl, Ulrik Franke, Bettina ...
ECIS
2001
14 years 11 months ago
Knowledge, learning and IT support in a small software company
The literature in the field of knowledge management shows a certain preoccupation with information technology (IT) and technical solutions while it reflects a limited view of orga...
Karlheinz Kautz, Kim Thaysen