Works matching DE "ENTERPRISEWIDE computing"
Results: 28
A Work Breakdown Structure that Integrates Different Views in Aircraft Modification Projects.
- Published in:
- Concurrent Engineering: Research & Applications, 2003, v. 11, n. 1, p. 47
- By:
- Publication type:
- Article
Optimal Processing Policies for an e-Commerce Web Server.
- Published in:
- INFORMS Journal on Computing, 2005, v. 17, n. 1, p. 99, doi. 10.1287/ijoc.1030.0044
- By:
- Publication type:
- Article
Web Services and Data Integration in Distributed Automation and Information Systems in Internet Environment.
- Published in:
- International Review on Computers & Software, 2006, v. 1, n. 3, p. 194
- By:
- Publication type:
- Article
The cost of not investing in new technology .
- Published in:
- Financial Executive, 1990, v. 6, n. 6, p. 55
- By:
- Publication type:
- Article
A Simulation Model Supporting Time and Non-time Metrics for Web Service Composition.
- Published in:
- Computer Journal, 2010, v. 53, n. 2, p. 219
- By:
- Publication type:
- Article
CIOs Under Pressure to Grow Businesses.
- Published in:
- IT Professional, 2006, v. 8, n. 1, p. 12
- Publication type:
- Article
International Museum of Photography at George Eastman House: Conventions for Cataloguing Photographs.
- Published in:
- Image, 1978, v. 21, n. 4, p. 1
- By:
- Publication type:
- Article
Comment (by David Brownstone).
- Published in:
- Brookings Papers on Economic Activity, 1996, p. 79
- By:
- Publication type:
- Article
Politics, Complexity, and Systems Implementation: Critically Exposing Power.
- Published in:
- Social Science Computer Review, 2006, v. 24, n. 3, p. 326, doi. 10.1177/0894439306287977
- By:
- Publication type:
- Article
Public and expert collaborative evaluation model and algorithm for enterprise knowledge.
- Published in:
- Enterprise Information Systems, 2013, v. 7, n. 3, p. 375, doi. 10.1080/17517575.2011.644583
- By:
- Publication type:
- Article
EMod: platform independent modelling, description and enactment of parameterisable EAI patterns.
- Published in:
- Enterprise Information Systems, 2009, v. 3, n. 3, p. 299, doi. 10.1080/17517570903042770
- By:
- Publication type:
- Article
Towards model-driven service-oriented enterprise computing.
- Published in:
- Enterprise Information Systems, 2009, v. 3, n. 3, p. 211, doi. 10.1080/17517570903116442
- By:
- Publication type:
- Article
Comprehensive life cycle support for access rules in information systems: the CEOSIS project.
- Published in:
- Enterprise Information Systems, 2009, v. 3, n. 3, p. 219, doi. 10.1080/17517570903045609
- By:
- Publication type:
- Article
Applying and extending a semantic foundation for role-related concepts in enterprise modelling.
- Published in:
- Enterprise Information Systems, 2009, v. 3, n. 3, p. 253, doi. 10.1080/17517570903046292
- By:
- Publication type:
- Article
Semantic enrichment process: An approach to software component reuse in modernizing enterprise systems.
- Published in:
- Information Systems Frontiers, 2011, v. 13, n. 3, p. 359, doi. 10.1007/s10796-010-9286-5
- By:
- Publication type:
- Article
Planning and scheduling of flexible process networks under uncertainty with stochastic inventory: MINLP models and algorithm.
- Published in:
- AIChE Journal, 2013, v. 59, n. 5, p. 1511, doi. 10.1002/aic.13924
- By:
- Publication type:
- Article
Bin Packing with Geometric Constraints in Computer Network Design.
- Published in:
- Operations Research, 1978, v. 26, n. 5, p. 760, doi. 10.1287/opre.26.5.760
- By:
- Publication type:
- Article
Embedding a Point-to-Point Network in the Expansion of Infrastructure for Information Systems.
- Published in:
- Journal of Management Information Systems, 1987, v. 4, n. 3, p. 50, doi. 10.1080/07421222.1987.11517800
- By:
- Publication type:
- Article
Implementation and the Organizational Impacts of Information Systems.
- Published in:
- Interfaces, 1987, v. 17, n. 3, p. 72, doi. 10.1287/inte.17.3.72
- By:
- Publication type:
- Article
FAULT TOLERANCE OF ADVANCED IRREGULAR SHUFFLE EXCHANGE NETWORK (AISEN).
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 1097, doi. 10.26483/ijarcs.v8i7.4520
- By:
- Publication type:
- Article
Automated analysis of timed security: a case study on web privacy.
- Published in:
- International Journal of Information Security, 2004, v. 2, n. 3/4, p. 168, doi. 10.1007/s10207-004-0037-9
- By:
- Publication type:
- Article
RepCIDN: A Reputation-based Collaborative Intrusion Detection Network to Lessen the Impact of Malicious Alarms.
- Published in:
- Journal of Network & Systems Management, 2013, v. 21, n. 1, p. 128, doi. 10.1007/s10922-012-9230-8
- By:
- Publication type:
- Article
Anomaly Detection Aiming Pro-Active Management of Computer Network Based on Digital Signature of Network Segment.
- Published in:
- Journal of Network & Systems Management, 2007, v. 15, n. 2, p. 267, doi. 10.1007/s10922-007-9064-y
- By:
- Publication type:
- Article
Wilson Parking Dials In Reliability, Efficiency With SmarTone.
- Published in:
- ComputerWorld Hong Kong, 2015, p. 23
- Publication type:
- Article
Enterprise mobility is nascent reality.
- Published in:
- ComputerWorld Hong Kong, 2007, v. 24, n. 8, p. 39
- By:
- Publication type:
- Article
Integrated Solution.
- Published in:
- Geospatial Solutions, 2005, v. 15, n. 9, p. 48
- Publication type:
- Article
Points of view.
- Published in:
- ITNOW, 2009, v. 51, n. 3, p. 16, doi. 10.1093/itnow/bwp047
- Publication type:
- Article
Metacomputing with Mobile Agents.
- Published in:
- International Journal of Parallel Programming, 2006, v. 34, n. 5, p. 429, doi. 10.1007/s10766-006-0021-2
- By:
- Publication type:
- Article