Journal articles on the topic 'Business protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Business protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Seguel, Ricardo, Rik Eshuis, and Paul Grefen. "Architecture Support for Flexible Business Chain Integration Using Protocol Adaptors." International Journal of Cooperative Information Systems 23, no. 04 (December 2014): 1450008. http://dx.doi.org/10.1142/s0218843014500087.
Full textFernández y Vázquez, Jorge Jesús. "Introducción al protocolo turístico-hotelero //Introduction to protocol Tourist & Hospitality." REVISTA ESTUDIOS INSTITUCIONALES 2, no. 3 (December 1, 2015): 201. http://dx.doi.org/10.5944/eeii.vol.2.n.3.2015.18370.
Full textOtt, Hermann E. "The Kyoto Protocol: Unfinished Business." Environment: Science and Policy for Sustainable Development 40, no. 6 (July 1998): 16–20. http://dx.doi.org/10.1080/00139159809604595.
Full textDan, A., D. M. Dias, R. Kearney, T. C. Lau, T. N. Nguyen, F. N. Parr, M. W. Sachs, and H. H. Shaikh. "Business-to-business integration with tpaML and a business-to-business protocol framework." IBM Systems Journal 40, no. 1 (2001): 68–90. http://dx.doi.org/10.1147/sj.401.0068.
Full textBotero, Isabel C., Gonzalo Gomez Betancourt, Jose Bernardo Betancourt Ramirez, and Maria Piedad Lopez Vergara. "Family protocols as governance tools." Journal of Family Business Management 5, no. 2 (October 12, 2015): 218–37. http://dx.doi.org/10.1108/jfbm-01-2015-0001.
Full textCortes, Angélica C. "Business protocol: a public relations approach." Corporate Communications: An International Journal 5, no. 3 (September 2000): 140–43. http://dx.doi.org/10.1108/13563280010377527.
Full textNourine, L., R. Ragab, and F. Toumani. "Decidability and Complexity of Web Service Business Protocol Synthesis." International Journal of Cooperative Information Systems 25, no. 03 (September 2016): 1650008. http://dx.doi.org/10.1142/s0218843016500088.
Full textDíaz Gómez, María Angustias, and Elicio Díaz Gómez. "Reflexiones sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las sociedades familiares." Pecvnia : Revista de la Facultad de Ciencias Económicas y Empresariales, Universidad de León, no. 12 (June 1, 2011): 91. http://dx.doi.org/10.18002/pec.v0i12.617.
Full textZhi, Huang, Xiang Qun Wang, and Wei Chen. "Application of IEEE802.1x Protocol Based on EPON System." Applied Mechanics and Materials 336-338 (July 2013): 2433–37. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2433.
Full textArteaga, Rocio, and Susana Menéndez-Requejo. "Family Constitution and Business Performance: Moderating Factors." Family Business Review 30, no. 4 (September 27, 2017): 320–38. http://dx.doi.org/10.1177/0894486517732438.
Full textDing, Xia Jun, Xiao Dan Jiang, and Yue Zhai Zheng. "The Research and Implementation of E-Commerce Secure Payment Protocol." Advanced Materials Research 267 (June 2011): 74–79. http://dx.doi.org/10.4028/www.scientific.net/amr.267.74.
Full textArslan, Halil. "Extensible messaging and presence protocol’s adaptation to business applications." Global Journal of Computer Sciences: Theory and Research 6, no. 1 (November 20, 2016): 10. http://dx.doi.org/10.18844/gjcs.v6i1.1210.
Full textArslan, Hasan, Sinan Tuncel, and Osman Gun. "Extensible messaging and presence protocol’s adaptation to business applications." Global Journal of Computer Sciences: Theory and Research 6, no. 1 (April 12, 2016): 10. http://dx.doi.org/10.18844/gjcs.v6i1.1338.
Full textLLORET, JAIME, JESUS TOMAS, MIGUEL GARCIA, and RAQUEL LACUESTA. "A B2B ARCHITECTURE AND PROTOCOL FOR RESEARCHERS COOPERATION." International Journal of Cooperative Information Systems 22, no. 02 (June 2013): 1350010. http://dx.doi.org/10.1142/s021884301350010x.
Full textWang, Yi Ran. "Research of E-Business Security Based on SOAP Protocol." Advanced Materials Research 189-193 (February 2011): 4304–7. http://dx.doi.org/10.4028/www.scientific.net/amr.189-193.4304.
Full textLI, Xiang, Jin-Peng HUAI, Xu-Dong LIU, Hai-Long SUN, and Xian-Yang QU. "Web Service Business Protocol Mining Based on Message Logs." Journal of Software 22, no. 7 (July 15, 2011): 1413–25. http://dx.doi.org/10.3724/sp.j.1001.2011.03820.
Full textAlMahmoud, Abdelrahman, Maurizio Colombo, Chan Yeob Yeun, and Hassan Al Muhairi. "Secure communication protocol for real-time business process monitoring." International Journal of Internet Technology and Secured Transactions 5, no. 3 (2014): 223. http://dx.doi.org/10.1504/ijitst.2014.065183.
Full textYounas, Muhammad, Barry Eaglestone, and Kuo-Ming Chao. "A low-latency resilient protocol for e-business transactions." International Journal of Web Engineering and Technology 1, no. 3 (2004): 278. http://dx.doi.org/10.1504/ijwet.2004.005234.
Full textTang, Lin, En Jian Bai, and Wen Qiang Wu. "A Secure Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard." Advanced Materials Research 403-408 (November 2011): 1845–48. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1845.
Full textTrinkaus, John. "Business Manners: An Informal Look." Perceptual and Motor Skills 68, no. 3 (June 1989): 945–46. http://dx.doi.org/10.2466/pms.1989.68.3.945.
Full textZhang, Chao Yi, and Yan Dong Zhao. "Multi-Path Relay Selection Based on Radio and Television Business." Advanced Materials Research 756-759 (September 2013): 1883–88. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1883.
Full textYefremova, Kateryna, and Maryna Lobko. "The art of diplomatic protocol as tool of business communication." Law and innovative society, no. 2 (15) (January 4, 2020): 35–39. http://dx.doi.org/10.37772/2309-9275-2020-2(15)-6.
Full textESWARAN, P. K., S. PRAKASH, DAVID D. FERGUSON, and KATHLEEN NAASZ. "LEVERAGING IP FOR BUSINESS SUCCESS." International Journal of Information Technology & Decision Making 02, no. 04 (December 2003): 641–50. http://dx.doi.org/10.1142/s0219622003000884.
Full textMoudjari, Abdelkader, Salim Chikhi, and Hamamache Kheddouci. "Latent semantic analysis for business protocol discovery using log files." International Journal of Web Engineering and Technology 9, no. 4 (2014): 365. http://dx.doi.org/10.1504/ijwet.2014.067550.
Full textEl Amin, M. H. M., L. N. Chung, and B. G. Evans. "Access protocol performance for on-board processing business satellite systems." International Journal of Satellite Communications 4, no. 4 (October 1986): 203–10. http://dx.doi.org/10.1002/sat.4600040406.
Full textOya, Makoto, Masahiro Kinoshita, and Yukinori Kakazu. "On dynamic generation of business protocol in autonomous Web services." Systems and Computers in Japan 37, no. 2 (February 2006): 37–45. http://dx.doi.org/10.1002/scj.20352.
Full textJi, Qiang, Shifeng Zhang, and Haoguang Zhao. "Research on Spacecraft Integrated Electronic System Architecture Based on Information Fusion." MATEC Web of Conferences 228 (2018): 01018. http://dx.doi.org/10.1051/matecconf/201822801018.
Full textSuminski Jr, Richard Robert, Shannon Robson, Jennie Turner, and Eric Plautz. "Promoting Small Business Support of Youth Physical Activity in Low-Income, Minority Neighborhoods: Protocol for a Randomized Controlled Trial." JMIR Research Protocols 8, no. 7 (July 30, 2019): e13141. http://dx.doi.org/10.2196/13141.
Full textCrawford, William B., and Christopher Engholm. "When Business East Meets Business West: The Guide to Practice and Protocol in the Pacific Rim." Journal of Marketing 57, no. 1 (January 1993): 127. http://dx.doi.org/10.2307/1252062.
Full textElabd, Emad, Emmanuel Coquery, and Mohand-Said Hacid. "From Implicit to Explicit Transitions in Business Protocols." International Journal of Web Services Research 9, no. 4 (October 2012): 69–95. http://dx.doi.org/10.4018/jwsr.2012100104.
Full textTareen, Laraib, Fowzia Menga, Nadeem Zaman, Manzoor Brohi, and Hadi Khan. "Business Motives among Students: A Qualitative Appraisal of Drive Theory." Jinnah Business Review 9, no. 2 (July 1, 2021): 61–74. http://dx.doi.org/10.53369/tcoq8790.
Full textMatias, Cláudia, and Mário Franco. "Family protocol: how it shapes succession in family firms." Journal of Business Strategy 41, no. 3 (December 20, 2018): 35–44. http://dx.doi.org/10.1108/jbs-09-2018-0167.
Full textBICHLER, MARTIN, ARIE SEGEV, and CARRIE BEAM. "AN ELECTRONIC BROKER FOR BUSINESS-TO-BUSINESS ELECTRONIC COMMERCE ON THE INTERNET." International Journal of Cooperative Information Systems 07, no. 04 (December 1998): 315–29. http://dx.doi.org/10.1142/s0218843098000155.
Full textSimanis, Erik, Stuart Hart, and Duncan Duke. "The Base of the Pyramid Protocol: Beyond “Basic Needs” Business Strategies." Innovations: Technology, Governance, Globalization 3, no. 1 (January 2008): 57–84. http://dx.doi.org/10.1162/itgg.2008.3.1.57.
Full textTao, Xiao Xia, Hong Yang, Rong Chen, and Zhen Jun Du. "An Improvement on Randomly Changed Identification Protocol for Low-Cost Tags." Advanced Materials Research 562-564 (August 2012): 1583–89. http://dx.doi.org/10.4028/www.scientific.net/amr.562-564.1583.
Full textUBERMORGEN, /. "Everything is always (the liquid protocol)." Finance and Society 2, no. 2 (December 19, 2016): 175–79. http://dx.doi.org/10.2218/finsoc.v2i2.1731.
Full textAbdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree, and Dana Doghramachi. "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 18 (November 10, 2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.
Full textWatters, Paul Andrew, and Maya Espinosa Walters. "Implications of Distributed Information Technology for South Pacific Development." South Pacific Journal of Psychology 9 (1997): 75–80. http://dx.doi.org/10.1017/s0257543400001188.
Full textKabou, Salheddine, and Sidi Mohamed Benslimane. "A New Distributed Anonymization Protocol with Minimal Loss of Information." International Journal of Organizational and Collective Intelligence 7, no. 1 (January 2017): 1–19. http://dx.doi.org/10.4018/ijoci.2017010101.
Full textWang, Yichuan, Han Yu, Xinhong Hei, Binbin Bai, and Wenjiang Ji. "From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT." Security and Communication Networks 2021 (August 2, 2021): 1–13. http://dx.doi.org/10.1155/2021/9179286.
Full textOcenasek, Pavel. "Effective Design and Implementation of Distributed Business Information Systems." Applied Mechanics and Materials 307 (February 2013): 451–54. http://dx.doi.org/10.4028/www.scientific.net/amm.307.451.
Full textJägers, Nicola. "National Human Rights Institutions: The Missing Link in Business and Human Rights Governance?" ICL Journal 14, no. 3 (November 25, 2020): 289–325. http://dx.doi.org/10.1515/icl-2020-0006.
Full textAhmed, Ajaz, and Aneel Salman. "Clean Development Mechanism (CDM) Business in Pakistan: Perceptions and Realities." Pakistan Development Review 51, no. 4II (December 1, 2012): 303–16. http://dx.doi.org/10.30541/v51i4iipp.303-316.
Full textShin, Sora, Hae-Hyun Choi, Yung Bin Kim, Byung-Hee Hong, and Joo-Young Lee. "Evaluation of body heating protocols with graphene heated clothing in a cold environment." International Journal of Clothing Science and Technology 29, no. 6 (November 6, 2017): 830–44. http://dx.doi.org/10.1108/ijcst-03-2017-0026.
Full textHunter, M. Gordon. "Creating Qualitative Interview Protocols." International Journal of Sociotechnology and Knowledge Development 4, no. 3 (July 2012): 1–16. http://dx.doi.org/10.4018/jskd.2012070101.
Full textAtienza, Mabelle A., and Almighty C. Tabuena. "The Impact of COVID-19 Pandemic on Managerial Accounting and Its Adjustments in Financial Markets." International Journal of Business, Technology and Organizational Behavior (IJBTOB) 1, no. 4 (August 12, 2021): 287–96. http://dx.doi.org/10.52218/ijbtob.v1i4.109.
Full textZinkhan, George M., and William B. Crawford. "Book Review: When Business East Meets Business West: The Guide to Practice and Protocol in the Pacific Rim." Journal of Marketing 57, no. 1 (January 1993): 127–28. http://dx.doi.org/10.1177/002224299305700109.
Full textLevä, Tapio, Mahya Ilaghi, Vilen Looga, Miika Komu, Nicklas Beijar, and Oleksiy Mazhelis. "Adoption of Constrained Application Protocol." International Journal of Innovation in the Digital Economy 7, no. 1 (January 2016): 38–53. http://dx.doi.org/10.4018/ijide.2016010104.
Full textMartin, Angela H., George Eckert, Gary W. Lemmon, Alan Sawchuk, and Michael C. Dalsing. "A vascular laboratory protocol for improving and managing after-hours suspected acute deep venous thrombosis." Vascular 22, no. 2 (May 13, 2013): 127–33. http://dx.doi.org/10.1177/1708538112474258.
Full textWu, Min, Ru Chuan Wang, Jing Li, and Zhi Jie Han. "A Novel P2P Business Traffic Prediction Algorithm." Key Engineering Materials 467-469 (February 2011): 1339–44. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.1339.
Full text