Sciweavers

5030 search results - page 910 / 1006
» cases 2007
Sort
View
JKM
2007
134views more  JKM 2007»
15 years 1 months ago
A strategy for knowledge management
Purpose – The purpose of this paper is to study the influence of organizational environment on the selection of knowledge management strategies. The paper focuses particularly ...
Martina E. Greiner, Tilo Böhmann, Helmut Krcm...
JMIV
2007
92views more  JMIV 2007»
15 years 1 months ago
Uniquely-Determined Thinning of the Tie-Zone Watershed Based on Label Frequency
There are many watershed transform algorithms in literature but most of them do not exactly correspond to their respective definition. The solution given by such algorithms depend...
Romaric Audigier, Roberto de Alencar Lotufo
JMS
2007
117views more  JMS 2007»
15 years 1 months ago
Closing Emergency Operating Rooms Improves Efficiency
Long waiting times for emergency operations increase a patient’s risk of postoperative complications and morbidity. Reserving Operating Room (OR) capacity is a common technique t...
Gerhard Wullink, Mark van Houdenhoven, Erwin W. Ha...
JNW
2007
128views more  JNW 2007»
15 years 1 months ago
Store and Forward Applications in Telemedicine for Wireless IP Based Networks
— Telemedicine is the use of telecommunications technology to provide medical information and services. It may be as simple as two health professionals discussing a case over the...
Poondi Srinivasan Pandian, Kadavath Peedikayil Saf...
JOC
2007
133views more  JOC 2007»
15 years 1 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin