This is TikiWiki v1.9.8.3 -Sirius- © 2002–2007 by the Tiki community Fri 22 of Nov, 2024 [14:18 UTC]
Menu

Category K.6 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS

Browse in:
All Wiki pages Image galleries Images File galleries Blogs Trackers Items Surveys Articles

search category: deep:

Hide subcategories objects

..
 

Objects (33)

K.6.5 Security and ProtectionArticle AGENT-BASED ANOMALIES MONITORING IN DISTRIBUTED SYSTEMS Abstract. In this paper an agent-based approach for anomalies monitoring in distributed systems such as computer networks, or Grid systems is proposed. This approach envisages on-line and off-line mo 
K.6 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS Article ANALYSIS AND JUSTIFICATION FOR SELECTION PARAMETERS OF WIRED ACCESS SYSTEMS Abstract: The executed researches belong to area of design of perspective access networks. Work is devoted to the analysis of parameters of access networks and a choice of the most significant among  
K.6 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS Article BI – SUPPORTING THE PROCESSES OF THE ORGANIZATION'S KNOWLEDGE MANAGEMENT Abstract. The main goal of BI systems is to provide the access for the users to crucial information connected with the tools they use every day. It allows to take more relevant decisions, share knowle 
K.6.0 General Article BUSINESS DISCOVERY – A NEW DIMENSION OF BUSINESS INTELLIGENCE Abstract. This article deals with the issue of Business Intelligence (BI), especially its next generation - Business Discovery(BD). This tool can help to fill the gap between traditional solutions we 
K.6 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS Article BUSINESS INTELLIGENCE AS A DECISION SUPPORT SYSTEM Abstract. Nowadays, we are bombarded with information which has an immense influence on our decisions. It is more and more difficult to use it effectively. BI systems are very helpful. They support e 
K.6.5 Security and ProtectionArticle CORRELATION-BASED PASSWORD GENERATION FROM FINGERPRINTS Abstract: In this paper, a methodology for reliable password generation from fingerprints is developed. In contrast to traditional biometric systems, proposed algorithm does not authenticate user by  
K.6.3 Software Management Article DEPENDENCE OF INFORMATION AND TELECOMMUNICATION TECHNOLOGY DEVELOPMENT ... Abstract: The article describes an analysis of the relationships between different ICT services indicators and economic indicators. Article also gives view for determining the impact of the economic  
K.6.5 Security and ProtectionArticle DIGITAL ARCHIVE AND MULTIMEDIA LIBRARY FOR BULGARIAN TRADITIONAL CULTURE ... Abstract: In this paper we present investigation of methods and techniques for digitization and security in digital folklore archive - an archive that consists of unique folklore artifacts stored and 
K.6.3 Software Management Article HUMAN AND TELECOMMUNICATION TECHNOLOGIES LIFE CYCLES COMPARISON Annotation: Main stages of human life cycle are described. The human and telecommunication technologies life cycle’s comparison is done. The general approach to the consideration of telecommunicati 
K.6 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS Article INFORMATION MODELS OF CUSTOMERS IN CRM AND E-CRM SYSTEMS Abstract: The following article deals with customer personality in the CRM systems. Its innovatory approach consists in the method of segmentation performed according to one of psychological factors  
K.6.0 General Article INFORMATION MODELS OF CUSTOMERS IN CRM AND E-CRM SYSTEMS Abstract: The following article deals with customer personality in the CRM systems. Its innovatory approach consists in the method of segmentation performed according to one of psychological factors  
K.6.1 Project and People Management Article IT PROJECTS-BASE CONTINUOUS LEARNING AT THE CHERNOBYL NPP Abstract: The best practices of Chernobyl NPP personnel training are presented in the framework of international projects implementation to improve safety and transform the Object "Shelter" into an  
K.6.4 System Management Article METHOD FOR CONTROLLING STATE CHANNEL WIRELESS NETWORKS UNDER A PRIORI ... Abstract: A method of monitoring the state of the radio channel using statistical information of the turbo decoder, the use of which in the adaptive system will allow carrying out its restructuring u 
K.6 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS Article METHOD FOR DETERMINATION OF INTERRELATION BETWEEN ACCESS NETWORK ... Annotation: The paper is dedicated to the solving of the task of analyzing the access networks parameters and to the determination of correlations between them. Considering the network total cost as  
K.6 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS Article METHODS FOR SOLVING OF SOME TASKS WITHIN THE PROBLEM OF OPTIMAL SYNTHESIS ... Annotation: Possible methods for solving particular problems arising from the decomposition of the problem of optimal synthesis of information networks in the course of their evolution are considered 
K.6.0 General Article OVERALL QOS REFERENCING IN TELECOMMUNICATION SYSTEMS – SOME CURRENT CONCEPTS . Abstract: The main current concepts in overall Quality of Service (QoS) considerations in telecommunication systems, in documents of the leading standardization organizations, are found and put togeth 
K.6.1 Project and People Management Article PROJECT MANAGEMENT IN CYBERSECURITY RESEARCH IN UKRAINE Abstract: This paper presents an approach to cyber security research project management. The paper includes the Project Management Office model and conception that can be created in educational and  
K.6.5 Security and ProtectionArticle PROTECTION OF COMPUTER INFORMATION SYSTEMS OF AGRICULTURAL ENTERPRISES Abstract: The article deals with some modern methods and technologies used in solving problems of information support of the effective management of the agricultural enterprise. It contains the princ 
K.6 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS Article STEPS IN THE DEVELOPMENT OF THE INFORMATION NETWORKS’ USER MODEL AS BADLY ... Abstract: Steps of an information networks’ creating through the formalization of one of their most important input parameters are proposed in the article. Stages of collecting information about use 
K.6.3 Software Management Article TACIT KNOWLEDGE AS A RESOURCE FOR ORGANIZATIONS AND ITS INTENSITY IN VARIOUS ... Abstract: Tacit knowledge continues to play a challenging role in any type of industry and is no doubt an everlasting resource. So it is important to realize the intensity and impact of tacit knowled 
K.6 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS Article THE ESTIMATION OF LEVEL OF READINESS OF UKRAINE FOR INFORMATION SOCIETY ... Abstract: This paper is devoted to the theoretical comprehension of role and status of information society and information economy in modern society as well as to the estimation of level of informati 
K.6 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS Article THE MANAGEMENT OF PATIENT INFORMATION IN POLISH HEALTH CARE SYSTEM Abstract: The purpose of the paper is to comprehensively characterize the implementation and the current use of electronic health records (EHRs) in Poland. The paper presents the conception of the ma 
K.6 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS Article The Method of the Ensurance of Structural Survivability of Telecommunication Net Summary: One of the most important properties of telecommunication networks to ensure their effective functioning is survivability. To ensure the survivability of telecommunication networks it’s re 
K.6.1 Project and People Management Article THE MODEL OF IT-STARTUP THAT GROWS IN UNIVERSITY ECOSYSTEM AND APPROACH TO ... Abstract: This paper is dedicated to description of method of the maturity estimation of startup and spin-off IT-companies created with the help of University Business Centers as an approach for coo 

Page: 1/2  [next]
1   2  
World Clock
Powered by Tikiwiki Powered by PHP Powered by Smarty Powered by ADOdb Made with CSS Powered by RDF powered by The PHP Layers Menu System
RSS Wiki RSS Blogs rss Articles RSS Image Galleries RSS File Galleries RSS Forums RSS Maps rss Calendars
[ Execution time: 0.21 secs ]   [ Memory usage: 9.12MB ]   [ GZIP Disabled ]   [ Server load: 0.57 ]