• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 1
  • Tagged with
  • 3
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Purchasing software components at the dawn of market

Ulkuniemi, P. (Pauliina) 22 November 2003 (has links)
Abstract This study explores the role and nature of purchasing and supplier relationship management in the specific, complex industry setting. The purpose is to develop concepts to describe, conceptualise and analyse the emerging software component market from the point of view of the industrial buyer. The theoretical discussion on the market is concluded with a framework consisting of two parts; one describing the main elements of the market from the buyer's perspective and another describing the dynamism of the market. The theoretical framework suggests that the elements of the market from the buyer company's perspective are (1) the own needs, (2) the industry demand, (3) the object of exchange, (4) the exchange mechanism, (5) the exchange counterpart and (6) the industry supply. In the dynamic part of the framework, the development of the software component market, i.e. the progression of the market process is understood through change of heterogeneity of supply and demand. The empirical part of the study includes an embedded single-case study where a buyer perceived COTS software component market is analysed. First, the elements of the case market are studied and variables describing these elements are identified. Following this, the dynamic part of the framework is used as basis for identifying alternative types of markets for the development of the COTS software component market. This is resulted in a typology of four market types from the purchasing perspective; (1) Co-operation projects, (2) Ideal market, (3) Competitive supply management and (4) Horizontal competition. It is argued that all these represent a different type of situation from the industrial purchasing perspective. Finally, it is suggested how the different elements of the market process represent themselves and how they can be used in managing purchasing and influencing the markets in each of these possible market types.
2

THE APPLICATION OF OBJECT-ORIENTED DATA MANAGEMENT TECHNIQUES TO T&E DATA CHALLENGES

Dawson, Dan 10 1900 (has links)
ITC/USA 2006 Conference Proceedings / The Forty-Second Annual International Telemetering Conference and Technical Exhibition / October 23-26, 2006 / Town and Country Resort & Convention Center, San Diego, California / This paper describes an adaptive data management architecture capable of supporting order-of-magnitude data volume increases without a priori knowledge of data structures. The architecture allows users to generate and maintain data in optimal legacy formats while managing and extracting information with common analysis tools. This paper shows how an object-oriented data management system can manage both data and the knowledge imparted to the data by users.
3

A Framework for MultiFactorAuthentication on Mobile Devices.- A Bayesian Approach

Ezeani, Callistus January 2019 (has links)
The most authentication mechanism used in certain domains like home banking, infrastructure surveillance, industrial control, etc. are commercial off the Shelf (COTS) solutions. These are packaged solutions which are adapted to satisfy the need of the purchasing organization, Microsoft, for example, is a COTS software provider. Multifactor Authentication (MFA) is COTS. MFA in the context of this research provides a framework to improve the available techniques. This framework is based on biometrics and as such presents, an alternative to complement the traditional knowledge-based authentication techniques. With an overview based on the probability of failure to enroll(FTE), this research work evaluates available approaches and identifies promising avenues in utilizing MFA in modern mobile devices. Biometrics removes heuristic errors and probability adjustment errors by providing the full potential to increase MFA in mobile devices. The primary objective is to Identify discrepancies and limitation commonly faced by mobile owners during authentication.

Page generated in 0.0299 seconds