Sciweavers

2309 search results - page 138 / 462
» Patterns for Technology Companies
Sort
View
CIMCA
2008
IEEE
15 years 11 months ago
Analysing Boundary Objects to Develop Results that Support Business Goals
In this study of eight outsourcing projects, we seek to understand the mechanisms that companies put in place to coordinate knowledge work across their boundaries. We find that m...
María Laura Ponisio, Peter Vruggink
142
Voted
SECURWARE
2008
IEEE
15 years 11 months ago
Formal Modeling of Authentication in SIP Registration
The Session Initiation Protocol (SIP) is increasingly used as a signaling protocol for administrating Voice over IP (VoIP) phone calls. SIP can be configured in several ways so t...
Anders Moen Hagalisletto, Lars Strand
DEEC
2007
IEEE
15 years 11 months ago
BestChoice SRM: a simple and practical supplier relationship management system for e-procurement
Supplier relationship management (SRM) is an important contributor to a company’s efficiency and credibility. Although several ways are used to provide SRM functionality, these a...
Dongjoo Lee, Seungseok Kang, Sangkeun Lee, Young-g...
ICWE
2007
Springer
15 years 10 months ago
The Use of a Bayesian Network for Web Effort Estimation
The objective of this paper is to describe the use of a probabilistic approach to Web effort estimation by means of a Bayesian Network. A Bayesian Network is a model that embodies ...
Emilia Mendes
SEMWEB
2007
Springer
15 years 10 months ago
Ontology-Based Information Extraction for Business Intelligence
Abstract. Business Intelligence (BI) requires the acquisition and aggregation of key pieces of knowledge from multiple sources in order to provide valuable information to customers...
Horacio Saggion, Adam Funk, Diana Maynard, Kalina ...