Sciweavers

1657 search results - page 9 / 332
» Roles in Information Systems: A Survey
Sort
View
137
Voted
FI
2010
175views more  FI 2010»
14 years 11 months ago
Applications and Security of Next-Generation, User-Centric Wireless Systems
: Pervasive wireless systems have significantly improved end-users' quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual inform...
Jerry Rick Ramstetter, Yaling Yang, Danfeng Yao
126
Voted
SACMAT
2003
ACM
15 years 7 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
82
Voted
HICSS
2007
IEEE
93views Biometrics» more  HICSS 2007»
15 years 8 months ago
Understanding CIO Role Effectiveness: The Antecedents and Consequents
This research-in-progress paper describes the development of a research model exploring the antecedents and consequents of CIO role effectiveness. Specifically, we argue that CIO ...
Daniel Q. Chen, David S. Preston
101
Voted
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
15 years 8 months ago
The Role and Emerging Landscape of Data Pools in the Retail and Consumer Goods Industries
In terms of electronic collaboration, the value chains of the retail and consumer goods industries can be ranked among the most advanced. Recent studies have underlined the import...
Jan Schemm, Christine Legner
DCAI
2008
15 years 3 months ago
A Survey of Distributed and Data Intensive CBR Systems
Case-Based Reasoning is a methodology that uses information that has been considered as valid in previous situations to solve new problems. That use of the information allows CBR s...
Aitor Mata