Artigos de revistas sobre o tema "Business protocol"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Business protocol".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Seguel, Ricardo, Rik Eshuis e Paul Grefen. "Architecture Support for Flexible Business Chain Integration Using Protocol Adaptors". International Journal of Cooperative Information Systems 23, n.º 04 (dezembro de 2014): 1450008. http://dx.doi.org/10.1142/s0218843014500087.
Texto completo da fonteFernández y Vázquez, Jorge Jesús. "Introducción al protocolo turístico-hotelero //Introduction to protocol Tourist & Hospitality". REVISTA ESTUDIOS INSTITUCIONALES 2, n.º 3 (1 de dezembro de 2015): 201. http://dx.doi.org/10.5944/eeii.vol.2.n.3.2015.18370.
Texto completo da fonteOtt, Hermann E. "The Kyoto Protocol: Unfinished Business". Environment: Science and Policy for Sustainable Development 40, n.º 6 (julho de 1998): 16–20. http://dx.doi.org/10.1080/00139159809604595.
Texto completo da fonteDan, A., D. M. Dias, R. Kearney, T. C. Lau, T. N. Nguyen, F. N. Parr, M. W. Sachs e H. H. Shaikh. "Business-to-business integration with tpaML and a business-to-business protocol framework". IBM Systems Journal 40, n.º 1 (2001): 68–90. http://dx.doi.org/10.1147/sj.401.0068.
Texto completo da fonteBotero, Isabel C., Gonzalo Gomez Betancourt, Jose Bernardo Betancourt Ramirez e Maria Piedad Lopez Vergara. "Family protocols as governance tools". Journal of Family Business Management 5, n.º 2 (12 de outubro de 2015): 218–37. http://dx.doi.org/10.1108/jfbm-01-2015-0001.
Texto completo da fonteCortes, Angélica C. "Business protocol: a public relations approach". Corporate Communications: An International Journal 5, n.º 3 (setembro de 2000): 140–43. http://dx.doi.org/10.1108/13563280010377527.
Texto completo da fonteNourine, L., R. Ragab e F. Toumani. "Decidability and Complexity of Web Service Business Protocol Synthesis". International Journal of Cooperative Information Systems 25, n.º 03 (setembro de 2016): 1650008. http://dx.doi.org/10.1142/s0218843016500088.
Texto completo da fonteDíaz Gómez, María Angustias, e Elicio Díaz Gómez. "Reflexiones sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las sociedades familiares". Pecvnia : Revista de la Facultad de Ciencias Económicas y Empresariales, Universidad de León, n.º 12 (1 de junho de 2011): 91. http://dx.doi.org/10.18002/pec.v0i12.617.
Texto completo da fonteZhi, Huang, Xiang Qun Wang e Wei Chen. "Application of IEEE802.1x Protocol Based on EPON System". Applied Mechanics and Materials 336-338 (julho de 2013): 2433–37. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2433.
Texto completo da fonteArteaga, Rocio, e Susana Menéndez-Requejo. "Family Constitution and Business Performance: Moderating Factors". Family Business Review 30, n.º 4 (27 de setembro de 2017): 320–38. http://dx.doi.org/10.1177/0894486517732438.
Texto completo da fonteDing, Xia Jun, Xiao Dan Jiang e Yue Zhai Zheng. "The Research and Implementation of E-Commerce Secure Payment Protocol". Advanced Materials Research 267 (junho de 2011): 74–79. http://dx.doi.org/10.4028/www.scientific.net/amr.267.74.
Texto completo da fonteArslan, Halil. "Extensible messaging and presence protocol’s adaptation to business applications". Global Journal of Computer Sciences: Theory and Research 6, n.º 1 (20 de novembro de 2016): 10. http://dx.doi.org/10.18844/gjcs.v6i1.1210.
Texto completo da fonteArslan, Hasan, Sinan Tuncel e Osman Gun. "Extensible messaging and presence protocol’s adaptation to business applications". Global Journal of Computer Sciences: Theory and Research 6, n.º 1 (12 de abril de 2016): 10. http://dx.doi.org/10.18844/gjcs.v6i1.1338.
Texto completo da fonteLLORET, JAIME, JESUS TOMAS, MIGUEL GARCIA e RAQUEL LACUESTA. "A B2B ARCHITECTURE AND PROTOCOL FOR RESEARCHERS COOPERATION". International Journal of Cooperative Information Systems 22, n.º 02 (junho de 2013): 1350010. http://dx.doi.org/10.1142/s021884301350010x.
Texto completo da fonteWang, Yi Ran. "Research of E-Business Security Based on SOAP Protocol". Advanced Materials Research 189-193 (fevereiro de 2011): 4304–7. http://dx.doi.org/10.4028/www.scientific.net/amr.189-193.4304.
Texto completo da fonteLI, Xiang, Jin-Peng HUAI, Xu-Dong LIU, Hai-Long SUN e Xian-Yang QU. "Web Service Business Protocol Mining Based on Message Logs". Journal of Software 22, n.º 7 (15 de julho de 2011): 1413–25. http://dx.doi.org/10.3724/sp.j.1001.2011.03820.
Texto completo da fonteAlMahmoud, Abdelrahman, Maurizio Colombo, Chan Yeob Yeun e Hassan Al Muhairi. "Secure communication protocol for real-time business process monitoring". International Journal of Internet Technology and Secured Transactions 5, n.º 3 (2014): 223. http://dx.doi.org/10.1504/ijitst.2014.065183.
Texto completo da fonteYounas, Muhammad, Barry Eaglestone e Kuo-Ming Chao. "A low-latency resilient protocol for e-business transactions". International Journal of Web Engineering and Technology 1, n.º 3 (2004): 278. http://dx.doi.org/10.1504/ijwet.2004.005234.
Texto completo da fonteTang, Lin, En Jian Bai e Wen Qiang Wu. "A Secure Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard". Advanced Materials Research 403-408 (novembro de 2011): 1845–48. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1845.
Texto completo da fonteTrinkaus, John. "Business Manners: An Informal Look". Perceptual and Motor Skills 68, n.º 3 (junho de 1989): 945–46. http://dx.doi.org/10.2466/pms.1989.68.3.945.
Texto completo da fonteZhang, Chao Yi, e Yan Dong Zhao. "Multi-Path Relay Selection Based on Radio and Television Business". Advanced Materials Research 756-759 (setembro de 2013): 1883–88. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1883.
Texto completo da fonteYefremova, Kateryna, e Maryna Lobko. "The art of diplomatic protocol as tool of business communication". Law and innovative society, n.º 2 (15) (4 de janeiro de 2020): 35–39. http://dx.doi.org/10.37772/2309-9275-2020-2(15)-6.
Texto completo da fonteESWARAN, P. K., S. PRAKASH, DAVID D. FERGUSON e KATHLEEN NAASZ. "LEVERAGING IP FOR BUSINESS SUCCESS". International Journal of Information Technology & Decision Making 02, n.º 04 (dezembro de 2003): 641–50. http://dx.doi.org/10.1142/s0219622003000884.
Texto completo da fonteMoudjari, Abdelkader, Salim Chikhi e Hamamache Kheddouci. "Latent semantic analysis for business protocol discovery using log files". International Journal of Web Engineering and Technology 9, n.º 4 (2014): 365. http://dx.doi.org/10.1504/ijwet.2014.067550.
Texto completo da fonteEl Amin, M. H. M., L. N. Chung e B. G. Evans. "Access protocol performance for on-board processing business satellite systems". International Journal of Satellite Communications 4, n.º 4 (outubro de 1986): 203–10. http://dx.doi.org/10.1002/sat.4600040406.
Texto completo da fonteOya, Makoto, Masahiro Kinoshita e Yukinori Kakazu. "On dynamic generation of business protocol in autonomous Web services". Systems and Computers in Japan 37, n.º 2 (fevereiro de 2006): 37–45. http://dx.doi.org/10.1002/scj.20352.
Texto completo da fonteJi, Qiang, Shifeng Zhang e Haoguang Zhao. "Research on Spacecraft Integrated Electronic System Architecture Based on Information Fusion". MATEC Web of Conferences 228 (2018): 01018. http://dx.doi.org/10.1051/matecconf/201822801018.
Texto completo da fonteSuminski Jr, Richard Robert, Shannon Robson, Jennie Turner e Eric Plautz. "Promoting Small Business Support of Youth Physical Activity in Low-Income, Minority Neighborhoods: Protocol for a Randomized Controlled Trial". JMIR Research Protocols 8, n.º 7 (30 de julho de 2019): e13141. http://dx.doi.org/10.2196/13141.
Texto completo da fonteCrawford, William B., e Christopher Engholm. "When Business East Meets Business West: The Guide to Practice and Protocol in the Pacific Rim". Journal of Marketing 57, n.º 1 (janeiro de 1993): 127. http://dx.doi.org/10.2307/1252062.
Texto completo da fonteElabd, Emad, Emmanuel Coquery e Mohand-Said Hacid. "From Implicit to Explicit Transitions in Business Protocols". International Journal of Web Services Research 9, n.º 4 (outubro de 2012): 69–95. http://dx.doi.org/10.4018/jwsr.2012100104.
Texto completo da fonteTareen, Laraib, Fowzia Menga, Nadeem Zaman, Manzoor Brohi e Hadi Khan. "Business Motives among Students: A Qualitative Appraisal of Drive Theory". Jinnah Business Review 9, n.º 2 (1 de julho de 2021): 61–74. http://dx.doi.org/10.53369/tcoq8790.
Texto completo da fonteMatias, Cláudia, e Mário Franco. "Family protocol: how it shapes succession in family firms". Journal of Business Strategy 41, n.º 3 (20 de dezembro de 2018): 35–44. http://dx.doi.org/10.1108/jbs-09-2018-0167.
Texto completo da fonteBICHLER, MARTIN, ARIE SEGEV e CARRIE BEAM. "AN ELECTRONIC BROKER FOR BUSINESS-TO-BUSINESS ELECTRONIC COMMERCE ON THE INTERNET". International Journal of Cooperative Information Systems 07, n.º 04 (dezembro de 1998): 315–29. http://dx.doi.org/10.1142/s0218843098000155.
Texto completo da fonteSimanis, Erik, Stuart Hart e Duncan Duke. "The Base of the Pyramid Protocol: Beyond “Basic Needs” Business Strategies". Innovations: Technology, Governance, Globalization 3, n.º 1 (janeiro de 2008): 57–84. http://dx.doi.org/10.1162/itgg.2008.3.1.57.
Texto completo da fonteTao, Xiao Xia, Hong Yang, Rong Chen e Zhen Jun Du. "An Improvement on Randomly Changed Identification Protocol for Low-Cost Tags". Advanced Materials Research 562-564 (agosto de 2012): 1583–89. http://dx.doi.org/10.4028/www.scientific.net/amr.562-564.1583.
Texto completo da fonteUBERMORGEN, /. "Everything is always (the liquid protocol)". Finance and Society 2, n.º 2 (19 de dezembro de 2016): 175–79. http://dx.doi.org/10.2218/finsoc.v2i2.1731.
Texto completo da fonteAbdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree e Dana Doghramachi. "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol". International Journal of Interactive Mobile Technologies (iJIM) 14, n.º 18 (10 de novembro de 2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.
Texto completo da fonteWatters, Paul Andrew, e Maya Espinosa Walters. "Implications of Distributed Information Technology for South Pacific Development". South Pacific Journal of Psychology 9 (1997): 75–80. http://dx.doi.org/10.1017/s0257543400001188.
Texto completo da fonteKabou, Salheddine, e Sidi Mohamed Benslimane. "A New Distributed Anonymization Protocol with Minimal Loss of Information". International Journal of Organizational and Collective Intelligence 7, n.º 1 (janeiro de 2017): 1–19. http://dx.doi.org/10.4018/ijoci.2017010101.
Texto completo da fonteWang, Yichuan, Han Yu, Xinhong Hei, Binbin Bai e Wenjiang Ji. "From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT". Security and Communication Networks 2021 (2 de agosto de 2021): 1–13. http://dx.doi.org/10.1155/2021/9179286.
Texto completo da fonteOcenasek, Pavel. "Effective Design and Implementation of Distributed Business Information Systems". Applied Mechanics and Materials 307 (fevereiro de 2013): 451–54. http://dx.doi.org/10.4028/www.scientific.net/amm.307.451.
Texto completo da fonteJägers, Nicola. "National Human Rights Institutions: The Missing Link in Business and Human Rights Governance?" ICL Journal 14, n.º 3 (25 de novembro de 2020): 289–325. http://dx.doi.org/10.1515/icl-2020-0006.
Texto completo da fonteAhmed, Ajaz, e Aneel Salman. "Clean Development Mechanism (CDM) Business in Pakistan: Perceptions and Realities". Pakistan Development Review 51, n.º 4II (1 de dezembro de 2012): 303–16. http://dx.doi.org/10.30541/v51i4iipp.303-316.
Texto completo da fonteShin, Sora, Hae-Hyun Choi, Yung Bin Kim, Byung-Hee Hong e Joo-Young Lee. "Evaluation of body heating protocols with graphene heated clothing in a cold environment". International Journal of Clothing Science and Technology 29, n.º 6 (6 de novembro de 2017): 830–44. http://dx.doi.org/10.1108/ijcst-03-2017-0026.
Texto completo da fonteHunter, M. Gordon. "Creating Qualitative Interview Protocols". International Journal of Sociotechnology and Knowledge Development 4, n.º 3 (julho de 2012): 1–16. http://dx.doi.org/10.4018/jskd.2012070101.
Texto completo da fonteAtienza, Mabelle A., e Almighty C. Tabuena. "The Impact of COVID-19 Pandemic on Managerial Accounting and Its Adjustments in Financial Markets". International Journal of Business, Technology and Organizational Behavior (IJBTOB) 1, n.º 4 (12 de agosto de 2021): 287–96. http://dx.doi.org/10.52218/ijbtob.v1i4.109.
Texto completo da fonteZinkhan, George M., e William B. Crawford. "Book Review: When Business East Meets Business West: The Guide to Practice and Protocol in the Pacific Rim". Journal of Marketing 57, n.º 1 (janeiro de 1993): 127–28. http://dx.doi.org/10.1177/002224299305700109.
Texto completo da fonteLevä, Tapio, Mahya Ilaghi, Vilen Looga, Miika Komu, Nicklas Beijar e Oleksiy Mazhelis. "Adoption of Constrained Application Protocol". International Journal of Innovation in the Digital Economy 7, n.º 1 (janeiro de 2016): 38–53. http://dx.doi.org/10.4018/ijide.2016010104.
Texto completo da fonteMartin, Angela H., George Eckert, Gary W. Lemmon, Alan Sawchuk e Michael C. Dalsing. "A vascular laboratory protocol for improving and managing after-hours suspected acute deep venous thrombosis". Vascular 22, n.º 2 (13 de maio de 2013): 127–33. http://dx.doi.org/10.1177/1708538112474258.
Texto completo da fonteWu, Min, Ru Chuan Wang, Jing Li e Zhi Jie Han. "A Novel P2P Business Traffic Prediction Algorithm". Key Engineering Materials 467-469 (fevereiro de 2011): 1339–44. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.1339.
Texto completo da fonte