Sciweavers

13489 search results - page 2685 / 2698
» Self-migration of operating systems
Sort
View
HICSS
2003
IEEE
98views Biometrics» more  HICSS 2003»
15 years 5 months ago
Effectiveness and Applicability of Internet-Based Training in the Corporation - Case of Egypt
Learning is the most indispensable activity in the current knowledge-based economy where firms, in order to compete and survive, must be constantly alert, capable of adapting to f...
Mohamed Ibrahim
HICSS
2003
IEEE
137views Biometrics» more  HICSS 2003»
15 years 5 months ago
Adjusting Safety Stock Requirements with an AHP-Based Risk Analysis
In most cases safety stock is determined based on the variability of the demand and lead time. The focus has been on the statistics and past performance, and the existing framewor...
Jukka Korpela, Antti Lehmusvaara, Kalevi Kylä...
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
15 years 5 months ago
Information Technology Fashions: Lifecycle Phase Analysis
Over the last decade, studies of management fashions have shown that the rise and fall of the fashions can be seen as a reflection of a knowledge enterprise, where knowledge of ne...
Jintae Lee, Emilio Collar Jr.
ICDCS
2003
IEEE
15 years 5 months ago
Protecting BGP Routes to Top Level DNS Servers
—The Domain Name System (DNS) is an essential part of the Internet infrastructure and provides fundamental services, such as translating host names into IP addresses for Internet...
Lan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Dan...
ICDM
2003
IEEE
92views Data Mining» more  ICDM 2003»
15 years 5 months ago
Validating and Refining Clusters via Visual Rendering
Clustering is an important technique for understanding and analysis of large multi-dimensional datasets in many scientific applications. Most of clustering research to date has be...
Keke Chen, Ling Liu
« Prev « First page 2685 / 2698 Last » Next »