Sciweavers

198 search results - page 15 / 40
» Using Business Network Models in Web-Pilarcos
Sort
View
ACSAC
2000
IEEE
15 years 1 months ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
72
Voted
INTR
2007
81views more  INTR 2007»
14 years 9 months ago
Network externality and future usage of Internet services
Purpose – The purpose of this paper is to investigate different effects of three network externality factors, i.e. local network size, network strength, and total network size, ...
Sung Yong Chun, Minhi Hahn
HICSS
2002
IEEE
82views Biometrics» more  HICSS 2002»
15 years 2 months ago
Customer Role Ambiguity in Community Management
This paper examines challenges involved in managing product-centered communities. Using the notion of customer role ambiguity, the paper explores the ambiguity involved in balanci...
Helena Holmström, Ola Henfridsson
EEE
2004
IEEE
15 years 1 months ago
Value-Based Design of Collaboration Processes for e-Commerce
Designing cross-organizational e-business applications faces the problem that the collaborating businesses must align their commercial interests without any central decision makin...
Pascal van Eck, Jaap Gordijn, Roel Wieringa
INFOCOM
1997
IEEE
15 years 1 months ago
Time Scale Analysis of an ATM Queueing System with Long-Range Dependent Traffic
Several types of network trafic have been shown to exhibit long-range dependence (LRD). In this work, we show that the busy period of an ATM system driven by a long-range dependen...
Gilberto Mayor, John A. Silvester