Sciweavers

2163 search results - page 74 / 433
» cases 2004
Sort
View
SPW
2004
Springer
15 years 3 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
ECIS
2004
14 years 11 months ago
ERP revelations: the dynamics of contextual forces of ERP implementation
This paper reports the findings of an in-depth case study of implementing Enterprise Resource Planning Systems (ERP) in a long-established multinational company within the telecom...
Joe Nandhakumar, Jari M. Talvinen, Matti Rossi
ECIS
2004
14 years 11 months ago
Formulating an organizational knowledge strategy: the influence of existing IT infrastructure
This paper questions the influence of a pre-existing information technology (IT) infrastructure on the formulation of an organizational knowledge strategy. We draw on a classifica...
Krishna Venkitachalam, Rens Scheepers
IJIT
2004
14 years 11 months ago
A Comparison of First and Second Order Training Algorithms for Artificial Neural Networks
Minimization methods for training feed-forward networks with Backpropagation are compared. Feedforward network training is a special case of functional minimization, where no expli...
Syed Muhammad Aqil Burney, Tahseen Ahmed Jilani, C...
ECIS
2000
14 years 11 months ago
Challenging the Installed Base: Deploying a Large-Scale IS in a Global Organization
: Economic theory and business strategists have pointed at the phenomenon of positive externalities and the related enabling and constraining aspects of an installed base. For inst...
Knut H. Rolland