Sciweavers

1205 search results - page 225 / 241
» Mobile product customization
Sort
View
SACMAT
2003
ACM
15 years 3 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
SIGUCCS
2003
ACM
15 years 3 months ago
Deep in the heart of client services: it's not just about hardware and software
“Client Services”, “User Services”, “Customer Service”: whatever we call it at our various colleges and universities, it’s not just about fixing hardware and softwar...
Cynthia A. Murnan
HICSS
2002
IEEE
92views Biometrics» more  HICSS 2002»
15 years 2 months ago
Strategic 'Morphing' and the Survivability of E-commerce Firms
Over the past year, the shakeout in the electronic commerce marketplace has redirected the attention of entrepreneurs and investors from the funding hype surrounding Internet star...
Robert J. Kauffman, Bin Wang, Tim Miller
ICRA
2002
IEEE
100views Robotics» more  ICRA 2002»
15 years 2 months ago
Achieving Sharp Deliveries in Supply Chains through Variance Pool Allocation
Variability reduction and business process synchronization are acknowledged as key to achieving sharp and timely deliveries in supply chain networks. In this paper, we develop an ...
Dinesh Garg, Yadati Narahari, Nukala Viswanadham
IPPS
2002
IEEE
15 years 2 months ago
Utilization-Based Heuristics for Statically Mapping Real-Time Applications onto the HiPer-D Heterogeneous Computing System
Real-time applications continue to increase in importance as they are employed in various critical areas, such as command and control systems. These applications have traditionall...
Shoukat Ali, Jong-Kook Kim, Yang Yu, Shriram B. Gu...