Sciweavers

6431 search results - page 1135 / 1287
» Model Building by Resolution
Sort
View
ECIS
2004
15 years 4 months ago
Deriving business value from IT: converting IT expenditures into assets with desired impacts
The research reported in this paper examines how business value is being created and delivered by IT in large private organisations in Australia. The critical organisational gover...
Judy McKay, Peter Marshall
ECIS
2004
15 years 4 months ago
Perceived risk and trust associated with purchasing at electronic marketplaces
Understanding consumer behavior is of vital importance to consumer oriented e-business models today. In this paper we report on a study into the relationships between consumer per...
Tibert Verhagen, Yao-Hua Tan
DBSEC
2006
115views Database» more  DBSEC 2006»
15 years 4 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
DMIN
2006
123views Data Mining» more  DMIN 2006»
15 years 4 months ago
Application of data warehouse technology in power analysis
: Data warehouse technology transforms the operational data store to general and compositive information. It also provides effective way for analysis and statistic to the mass data...
Xiaoguang Hong, Juan Chu
FLAIRS
2004
15 years 4 months ago
Mining Bayesian Networks to Forecast Adverse Outcomes Related to Acute Coronary Syndrome
One fascinating aspect of tool building for datamining is the application of a generalized datamining tool to a specific domain. Often times, this process results in a cross disci...
Andy Novobilski, Francis M. Fesmire, David Sonnema...
« Prev « First page 1135 / 1287 Last » Next »