Search results

Jump to: navigation, search
  • papers on practical studies and experiments, critique of existing work, emerging issues, * Cryptographic techniques and key management
    16 KB (2,178 words) - 12:59, 18 January 2009
  • ...f a particular community. In many cases, the funding and support for these critical initiatives is fragile and temporary, and directed in piecemeal fashion. Th Information and Data Management
    4 KB (529 words) - 13:00, 18 January 2009
  • Such alignment is a critical ?early stage? activity to understand * Case studies and empirical reports on the benefits and costs of
    3 KB (465 words) - 13:01, 18 January 2009
  • ...pment projects will come under close scrutiny. It will become increasingly critical to design global partnerships that both clarify cost/benefits and enable de ...decisions; cost/benefit analysis; value propositions; risk assessment and management; vendor selection.
    6 KB (857 words) - 13:01, 18 January 2009
  • * Trust and reputation models and management * Service science, management and engineering
    6 KB (767 words) - 13:01, 18 January 2009
  • ...cated, remote and mobile participants simultaneously. Similarly, it may be critical to support a spectrum of richness and responsiveness. In order to move forw ...design and real-world user experience. In particular, we are interested in studies that show how to enable easy and effective crossovers between media like vi
    5 KB (670 words) - 17:08, 27 February 2009
  • safety-critical, embedded, or mobile systems - scheduling and resource management
    4 KB (504 words) - 16:43, 27 December 2015
  • ...nting and discussing new educational environments, best practices and case studies on innovative technology-based learning strategies, institutional policies 4. Legal and Cultural Management Issues
    5 KB (661 words) - 15:49, 8 December 2009
  • |Title=2nd International Workshop on Agent Technology for Disaster Management ...become a key concern both from a social and political point of view. It is critical to provide rescue personnel with information technology tools that enable m
    6 KB (783 words) - 17:04, 27 December 2015
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...onse planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance
    6 KB (746 words) - 11:35, 2 August 2009
  • In this scenario, it is critical that the underlying business models help to Knowledge management in service ecosystems
    4 KB (586 words) - 11:35, 2 August 2009
  • ...mate change is likely to be the defining issue of the 21st Century. Recent studies indicate that climate change is accelerating, confirming the most pessimist ...y). In nearly all these challenges, software has a major role to play as a critical enabling technology.
    7 KB (992 words) - 11:44, 2 August 2009
  • | Title = ACM First International Workshop on Data-intensive Software Management and Mining Data-intensive Software Management and Mining
    4 KB (543 words) - 11:35, 2 August 2009
  • ...information flow between partners involved in supply chains (supply chain management). However, today’s business environment is changing significantly due to ...east with its existing set of standards, it promotes adaptive supply chain management concepts, flexible and re-configurable logistics service provisioning along
    12 KB (1,624 words) - 11:36, 2 August 2009
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...mization; Internet performance prediction; Internet performance evaluation studies; Internet performance testbeds; Performance evaluation of Web search engine
    14 KB (1,651 words) - 15:56, 15 February 2017
  • -Implementation, deployment and management of network security policies ...ection: protocols, implementations, metering, watermarking, digital rights management
    6 KB (766 words) - 10:54, 26 April 2010
  • ...national, interdisciplinary, graduate student association dedicated to the critical analysis of terrorism, counterterrorism policy, and related national and in ...nological impacts of security concerns and the conclusions drawn from such critical paradigms, and 4) The ongoing search for security. SATSA and the Moynihan
    3 KB (359 words) - 00:15, 17 November 2009
  • The conference addresses critical issues related to diversity. Proposals on all relevant topics are welcome, ...ry, cultural studies, culture, globalisation, interdisciplinary, learning, management, globalization, social justice, race, ethnicity, gender, education, multidi
    932 bytes (103 words) - 11:52, 1 March 2012
  • |Field=Critical Management Studies ...d differentiations); procedurisation of innovation; meaning and utility of management standards both online and offline; sophistication of managerial control and
    5 KB (638 words) - 10:47, 20 September 2010
  • Risk and Incident Management Investigative Case Studies
    3 KB (462 words) - 11:51, 22 March 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)