Enterprise Content Management System for IT Training
暂无分享,去创建一个
[1] Peretz Shoval,et al. Evaluation of an ontology-content based filtering method for a personalized newspaper , 2008, RecSys '08.
[2] Jothy Rosenberg,et al. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption , 2004 .
[3] H. Leino‐Kilpi,et al. Privacy: a review of the literature. , 2001, International journal of nursing studies.
[4] Dickson K. W. Chiu,et al. How Ontologies can Help in an E-Marketplace , 2005, ECIS.
[5] David S. Linthicum,et al. Next Generation Application Integration: From Simple Information to Web Services , 2003 .
[6] Nader Nada,et al. ONTOLOGY -ORIENTED INFERENCE -BASED LEARNING CONTENT MANAGEMENT SYSTEM , 2012 .
[7] Rosa Maria Vicari,et al. Towards an Adaptive Web Training Environment Based on Cognitive Style of Learning: An Empirical Approach , 2002, AH.
[8] Elisa Bertino,et al. Protection and administration of XML data sources , 2002, Data Knowl. Eng..
[9] Dickson K. W. Chiu,et al. Engineering Financial Enterprise Content Management Services : Integration and Control , 2010, Int. J. Syst. Serv. Oriented Eng..
[10] C. Powers. Privacy Promises, Access Control, and Privacy Management , 2002 .
[11] Alex A. Freitas,et al. A survey of hierarchical classification across different application domains , 2010, Data Mining and Knowledge Discovery.
[12] Shing-Chi Cheung,et al. A three-tier view-based methodology for M-services adaptation , 2003, IEEE Trans. Syst. Man Cybern. Part A.
[13] S. Fischer-Hübner. IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms , 2001 .
[14] Dickson K. W. Chiu,et al. Web Interface-Driven Cooperative Exception Handling in Adome Workflow Management System , 2001, Inf. Syst..
[15] Lerina Aversano,et al. Integrating document and workflow management tools using XML and web technologies: a case study , 2002, Proceedings of the Sixth European Conference on Software Maintenance and Reengineering.
[16] Fumihiko Kitayama,et al. Design of a framework for dynamic content adaptation to Web-enabled terminals and enterprise applications , 1999, Proceedings Sixth Asia Pacific Software Engineering Conference (ASPEC'99) (Cat. No.PR00509).
[17] Dickson K. W. Chiu,et al. Metadata Design of a Content Management System for Music Virtual Learning Environment , 2015, Int. J. Syst. Serv. Oriented Eng..
[18] Dickson K. W. Chiu,et al. On the making of service recommendations: An action theory based on utility, reputation, and risk attitude , 2009, Expert Syst. Appl..
[19] Neha Jain,et al. Specifying privacy policies with P3P and EPAL: lessons learned , 2004, WPES '04.
[20] Dickson K. W. Chiu,et al. Privacy and Access Control Issues in Financial Enterprise Content Management , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[21] Wolfgang Gentzsch,et al. Grid Computing: A New Technology for the Advanced Web , 2001, IWCC.
[22] Dickson K. W. Chiu,et al. A Meta Modeling Approach to Workflow Management Systems Supporting Exception Handling , 1999, Inf. Syst..
[23] John Garmany,et al. Oracle Replication: Snapshot, Multi-master & Materialized Views Scripts (Oracle In-Focus) , 2003 .
[24] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[25] Robert J. Shimonski,et al. Building DMZs for Enterprise Networks , 2003 .
[26] Pauline Ratnasingam. The importance of technology trust in Web services security , 2002, Inf. Manag. Comput. Secur..
[27] F. Schoeman. Philosophical Dimensions of Privacy: An Anthology , 1984 .
[28] David Carlson,et al. Modeling XML Applications with UML: Practical e-Business Applications , 2001 .
[29] Amrit Tiwana,et al. The Essential Guide to Knowledge Management: E-Business and CRM Applications , 2000 .
[30] Shing-Chi Cheung,et al. The Use of Digital Watermarking for Intelligence Multimedia Document Distribution , 2008, J. Theor. Appl. Electron. Commer. Res..
[31] Raymond K. Wong,et al. End-to-end privacy control in service outsourcing of human intensive processes: A multi-layered Web service integration approach , 2007, Inf. Syst. Frontiers.
[32] Ian A. Coutts,et al. Support for system evolution through separating business and technology issues in a banking system , 2000, Proceedings 2000 International Conference on Software Maintenance.
[33] Daphne Koller,et al. Hierarchically Classifying Documents Using Very Few Words , 1997, ICML.
[34] Minhong Wang,et al. Towards Ubiquitous Communication Support for Distance Education with Alert Management , 2008, J. Educ. Technol. Soc..
[35] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[36] Dickson K. W. Chiu,et al. Alert Driven Communications Management for Children Music Learning Based on Suzuki Method , 2015, Int. J. Syst. Serv. Oriented Eng..
[37] Xin Wang,et al. XrML -- eXtensible rights Markup Language , 2002, XMLSEC '02.