Search results

Jump to navigation Jump to search
Results 1 – 21 of 74
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...al studies, systematic reviews, conceptual explorations, innovative ideas, critical appraisals, etc. related to the following topics list: Knowledge Management and Engineering ...
    3 KB (332 words) - 17:36, 20 August 2012
  • The conference addresses critical issues related to diversity. Proposals on all relevant topics are welcome, ...ry, cultural studies, culture, globalisation, interdisciplinary, learning, management, globalization, social justice, race, ethnicity, gender, education, multidi ...
    932 bytes (103 words) - 09:52, 1 March 2012
  • |Field=Critical Management Studies ...d differentiations); procedurisation of innovation; meaning and utility of management standards both online and offline; sophistication of managerial control and ...
    5 KB (638 words) - 08:47, 20 September 2010
  • ...al studies, systematic reviews, conceptual explorations, innovative ideas, critical appraisals, etc. related to: knowledge management and engineering, ...
    4 KB (463 words) - 11:54, 18 October 2008
  • | Title = ACM First International Workshop on Data-intensive Software Management and Mining Data-intensive Software Management and Mining ...
    4 KB (543 words) - 09:35, 2 August 2009
  • | Acronym = SPECIAL ISSUE ON MISSION CRITICAL NETWOR 2009 | Title = JSAC CALL FOR PAPERS SPECIAL ISSUE ON MISSION CRITICAL NETWORKING ...
    5 KB (549 words) - 15:15, 5 July 2020
  • * Foundations and conceptual studies of and for agile methods * Empirical studies and experiences ...
    2 KB (230 words) - 08:36, 26 November 2017
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security ...ual meeting and conference of the newly formed IFIP Working Group on Trust Management (IFIP WG 11.11). IFIPTM 2007 provided a truly global platform for the repor ...
    4 KB (565 words) - 21:20, 14 October 2008
  • In this scenario, it is critical that the underlying business models help to Knowledge management in service ecosystems ...
    4 KB (586 words) - 09:35, 2 August 2009
  • ...national, interdisciplinary, graduate student association dedicated to the critical analysis of terrorism, counterterrorism policy, and related national and in ...nological impacts of security concerns and the conclusions drawn from such critical paradigms, and 4) The ongoing search for security. SATSA and the Moynihan ...
    3 KB (359 words) - 22:15, 16 November 2009
  • ...nting and discussing new educational environments, best practices and case studies on innovative technology-based learning strategies, institutional policies 4. Legal and Cultural Management Issues ...
    5 KB (661 words) - 13:49, 8 December 2009
  • multilingual document management/workflow case studies of technology-based solutions ...
    4 KB (576 words) - 21:06, 14 October 2008
  • real-time, safety-critical, embedded, or mobile systems * scheduling and resource management ...
    2 KB (254 words) - 21:22, 14 October 2008
  • ...rence topics of interest should include Economics, Management, Information Management, Innovation, Entrepreneurship, Education, Marketing, Human Resources, and F * Country and Industry Studies of Trade ...
    9 KB (896 words) - 14:31, 6 August 2020
  • ...First International Workshop on Dependability and Security in Complex and Critical Information Systems ...First International Workshop on Dependability and Security in Complex and Critical Information Systems ...
    7 KB (960 words) - 15:48, 14 October 2008
  • ...f a particular community. In many cases, the funding and support for these critical initiatives is fragile and temporary, and directed in piecemeal fashion. Th Information and Data Management ...
    4 KB (529 words) - 11:00, 18 January 2009
  • ...pment projects will come under close scrutiny. It will become increasingly critical to design global partnerships that both clarify cost/benefits and enable de ...decisions; cost/benefit analysis; value propositions; risk assessment and management; vendor selection. ...
    6 KB (857 words) - 11:01, 18 January 2009
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...onse planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance ...
    6 KB (746 words) - 09:35, 2 August 2009
  • ..., strategies for promoting, adopting, using Open Source Solutions and case studies or success stories in specific domains. ..., strategies for promoting, adopting, using Open Source Solutions and case studies or success stories in specific domains. ...
    5 KB (697 words) - 21:18, 14 October 2008
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)