abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
This paper reports the findings of an in-depth case study of implementing Enterprise Resource Planning Systems (ERP) in a long-established multinational company within the telecom...
This paper questions the influence of a pre-existing information technology (IT) infrastructure on the formulation of an organizational knowledge strategy. We draw on a classifica...
Minimization methods for training feed-forward networks with Backpropagation are compared. Feedforward network training is a special case of functional minimization, where no expli...
Syed Muhammad Aqil Burney, Tahseen Ahmed Jilani, C...
: Economic theory and business strategists have pointed at the phenomenon of positive externalities and the related enabling and constraining aspects of an installed base. For inst...