Добірка наукової літератури з теми "Business protocol"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Business protocol".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Business protocol"
Seguel, Ricardo, Rik Eshuis, and Paul Grefen. "Architecture Support for Flexible Business Chain Integration Using Protocol Adaptors." International Journal of Cooperative Information Systems 23, no. 04 (December 2014): 1450008. http://dx.doi.org/10.1142/s0218843014500087.
Повний текст джерелаFernández y Vázquez, Jorge Jesús. "Introducción al protocolo turístico-hotelero //Introduction to protocol Tourist & Hospitality." REVISTA ESTUDIOS INSTITUCIONALES 2, no. 3 (December 1, 2015): 201. http://dx.doi.org/10.5944/eeii.vol.2.n.3.2015.18370.
Повний текст джерелаOtt, Hermann E. "The Kyoto Protocol: Unfinished Business." Environment: Science and Policy for Sustainable Development 40, no. 6 (July 1998): 16–20. http://dx.doi.org/10.1080/00139159809604595.
Повний текст джерелаDan, A., D. M. Dias, R. Kearney, T. C. Lau, T. N. Nguyen, F. N. Parr, M. W. Sachs, and H. H. Shaikh. "Business-to-business integration with tpaML and a business-to-business protocol framework." IBM Systems Journal 40, no. 1 (2001): 68–90. http://dx.doi.org/10.1147/sj.401.0068.
Повний текст джерелаBotero, Isabel C., Gonzalo Gomez Betancourt, Jose Bernardo Betancourt Ramirez, and Maria Piedad Lopez Vergara. "Family protocols as governance tools." Journal of Family Business Management 5, no. 2 (October 12, 2015): 218–37. http://dx.doi.org/10.1108/jfbm-01-2015-0001.
Повний текст джерелаCortes, Angélica C. "Business protocol: a public relations approach." Corporate Communications: An International Journal 5, no. 3 (September 2000): 140–43. http://dx.doi.org/10.1108/13563280010377527.
Повний текст джерелаNourine, L., R. Ragab, and F. Toumani. "Decidability and Complexity of Web Service Business Protocol Synthesis." International Journal of Cooperative Information Systems 25, no. 03 (September 2016): 1650008. http://dx.doi.org/10.1142/s0218843016500088.
Повний текст джерелаDíaz Gómez, María Angustias, and Elicio Díaz Gómez. "Reflexiones sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las sociedades familiares." Pecvnia : Revista de la Facultad de Ciencias Económicas y Empresariales, Universidad de León, no. 12 (June 1, 2011): 91. http://dx.doi.org/10.18002/pec.v0i12.617.
Повний текст джерелаZhi, Huang, Xiang Qun Wang, and Wei Chen. "Application of IEEE802.1x Protocol Based on EPON System." Applied Mechanics and Materials 336-338 (July 2013): 2433–37. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2433.
Повний текст джерелаArteaga, Rocio, and Susana Menéndez-Requejo. "Family Constitution and Business Performance: Moderating Factors." Family Business Review 30, no. 4 (September 27, 2017): 320–38. http://dx.doi.org/10.1177/0894486517732438.
Повний текст джерелаДисертації з теми "Business protocol"
Gullová, Soňa. "Společenská etiketa, obchodní a diplomatický protokol." Doctoral thesis, Vysoká škola ekonomická v Praze, 2005. http://www.nusl.cz/ntk/nusl-77056.
Повний текст джерелаEslamichalandar, Maryam. "Web Service Composition Compatibility : adaptation in the presence of Business Protocol Evolution." Thesis, Paris, CNAM, 2013. http://www.theses.fr/2013CNAM0998/document.
Повний текст джерелаThe advent of Web service technologies in the paradigm of Service oriented architecture (SOA) enables dynamic and flexible interoperation of distributed business processes within and across organization boundaries. One of the challenges in working with heterogeneous and autonomous Web services is the need to ensure their interoperability and compatibility. The typical approach for enabling incompatible services to interact is service adaptation. The need for adaptation in Web services comes from the heterogeneity at the levels of service interface and business protocol. The service interface incompatibilities include service signature mismatches (e.g., message and operation name, number; the type of input/output message parameters of operations; and the parameter value constraint). The mismatches at the business protocol (or service behavior) level arise from the order constraints that services impose on messages exchanges (e.g., deadlock where both partner services are mutually waiting to receive some message from the other, and unspecified reception in which one service sends a message while the partner is not expecting it). In service interaction through adaptation, an adapter mediates the interactions between two services with potentially different interfaces and business protocols such that the interoperability is achieved, i.e., adapter compensates for the differences between their interfaces by data mappings, and between their business protocols by rearranging the messages exchanges or generating a missing message. In this dissertation, we focus on how to cope with the dynamic evolution of business protocol P of a given service (i.e., P is changed to P') that is adapted by an adapter in the context of service interaction. Web service specifications constantly evolve. For variety of reasons, service providers may change their business protocols. Therefore, it is important to understand the potential impacts of the changes arising from the evolution of service business protocol on the adapter.We present an approach to automatically detect the effects of business protocols evolution on the adapter and, if possible, to suggest fixes to update the specification of adapter on-the-fly. Besides, we propose a technique to verify the correctness of new adapter which is dynamically re-configured. Finally, we describe a prototype tool where experimentations show the benefits of proposed approach in terms of time and cost compared to the static methods aiming for complete regeneration of adapter or manual inspection and adaption of the adapter with respect to changes in the business protocols
Pelánová, Pavla. "Obchodní a diplomatický protokol Francie." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-193029.
Повний текст джерелаMorrison, Charles Michael. "An investigation of network efficiency and control protocol issues for a configurable collaboration support system." Diss., The University of Arizona, 1992. http://hdl.handle.net/10150/185931.
Повний текст джерелаTycová, Tereza. "Specifika obchodního jednání v Číně." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-206682.
Повний текст джерелаTreleaven, James Burris. "A protocol study of a complexity model of information acquisition from graphs and tables." Case Western Reserve University School of Graduate Studies / OhioLINK, 1990. http://rave.ohiolink.edu/etdc/view?acc_num=case1059052459.
Повний текст джерелаSchmidt, Robert. "What's Really Keeping the US from Joining the Kyoto Protocol. A Game Theoretic Empirical Analysis." Honors in the Major Thesis, University of Central Florida, 2006. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/994.
Повний текст джерелаBachelors
Business Administration
Business Economics
Echaiz, Moreno Daniel. "El protocolo familiar. La contractualización en las familias empresarias para la gestión de las empresas familiares." Instituto de Investigaciones Jurídicas de la UNAM, 2014. http://hdl.handle.net/10757/316346.
Повний текст джерелаThe family enterprises are a world phenomenon of great transcendency for the hight number of them, nevertheless they meet overwhelmed by the problem of the generational transition that, in many occasions, it marks the beginning of the end of the family enterprise
Kozlova, Tatjana, and Olga Tytarenko. "To buy and what to buy? : the study of consumer behaviour on the Internet." Thesis, Gotland University, Department of Business Administration, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hgo:diva-139.
Повний текст джерелаThe process that consumers go through while buying something is called consumer buying process and has been studied for a long time. Three stages of the Five-Stage Model (Kotler, 2006) provide a starting point for analysis in this paper and the reason of using this model is to make collected data more structured and easier for understanding. The purpose of this paper is to describe and analyze costumer buying process online.The method for data collection applied in this study is called “think-aloud” that means participants are verbalizing their screen activity and thoughts during the process of observation. The results of this research show that consumer buying process online is a complex process that is influenced by the amount and intensity of information received during the process as well as consumer knowledge and experience on the area of problem. The sequence of the stages proposed by the research model can vary depending on the preferences of consumer and readiness to make a decision.
Rana, Chirag N. "Enabling One-Phase Commit (1PC) Protocol for Web Service Atomic Transaction (WS-AT)." UNF Digital Commons, 2014. http://digitalcommons.unf.edu/etd/498.
Повний текст джерелаКниги з теми "Business protocol"
Robinson, David. Business protocol: Contemporary American practice. Cincinnati, OH: Atomic Dog Publishing, 2003.
Знайти повний текст джерелаOffice etiquette and protocol. New York: Learning Express, 1998.
Знайти повний текст джерелаYager, Jan. Business protocol: How to survive and succeed in business. New York: Wiley, 1991.
Знайти повний текст джерелаYager, Jan. Business protocol: How to survive and succeed in business. 2nd ed. Stamford, CT: Hannacroix Creek Books, 1998.
Знайти повний текст джерелаChristofferson, April. The protocol. New York: Forge, 2000.
Знайти повний текст джерелаLeaptrott, Nan. Rules of the game: Global business protocol. Cincinnati, Ohio: Thomson Executive Press, 1996.
Знайти повний текст джерелаMonod de Froideville, Gilbert, and Mark Verheul. An Experts' Guide to International Protocol. NL Amsterdam: Amsterdam University Press, 2021. http://dx.doi.org/10.5117/9789463727167.
Повний текст джерелаD, Schmidt Klaus. Business customs and protocol in the ASEAN region. Menlo Park, Calif: Business Intelligence Program, SRI International, 1985.
Знайти повний текст джерелаMcKinniss, Candace Bancroft. Business in Mexico: Managerial behavior, protocol, and etiquette. New York: Haworth Press, 1994.
Знайти повний текст джерелаCorporate protocol: A brief case for business etiquette. Tulsa: Honor, 1986.
Знайти повний текст джерелаЧастини книг з теми "Business protocol"
Di Lorenzo, Renato. "Protocol Validation." In Perspectives in Business Culture, 51–54. Milano: Springer Milan, 2012. http://dx.doi.org/10.1007/978-88-470-2534-9_10.
Повний текст джерелаRitter, Daniel. "The Business Graph Protocol." In Communications in Computer and Information Science, 226–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33308-8_19.
Повний текст джерелаRekik, Malek, Amel Makhlouf, Mohammad S. Obaidat, and Faouzi Zarai. "A Robust Stream Control Transmission Protocol (SCTP)-Based Authentication Protocol." In E-Business and Telecommunications, 34–57. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25915-4_3.
Повний текст джерелаKou, W. "Wireless Application Protocol." In Enabling Technologies for Wireless E-Business, 76–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/978-3-540-30637-5_4.
Повний текст джерелаSalhi, Abderrahim, Mariam Belghzal, Brahim Minaoui, and Abdellatif Hair. "Optimization of Leach Protocol for Saving Energie in Wireless Sensor Networks." In Business Intelligence, 361–75. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76508-8_26.
Повний текст джерелаKarwe, Markus, and Günter Müller. "DPIP: A Demand Response Privacy Preserving Interaction Protocol." In Business Information Systems Workshops, 224–34. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26762-3_20.
Повний текст джерелаDu, Rong, Colin Boyd, and Ernest Foo. "A Secure E-Tender Submission Protocol." In Trust and Privacy in Digital Business, 213–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11824633_22.
Повний текст джерелаSeguel, Ricardo, Rik Eshuis, and Paul Grefen. "Business Protocol Adaptation for Flexible Chain Management." In On the Move to Meaningful Internet Systems: OTM 2010, 438–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16934-2_32.
Повний текст джерелаAziz, Benjamin. "Correcting a Delegation Protocol for Grids." In Trust, Privacy and Security in Digital Business, 198–209. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22890-2_17.
Повний текст джерелаWakup, Christian, and Jörg Desel. "Analyzing a TCP/IP-Protocol with Process Mining Techniques." In Business Process Management Workshops, 353–64. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15895-2_30.
Повний текст джерелаТези доповідей конференцій з теми "Business protocol"
Desai, N., and M. P. Singh. "Protocol-based business process modeling and enactment." In Proceedings. IEEE International Conference on Web Services, 2004. IEEE, 2004. http://dx.doi.org/10.1109/icws.2004.1314721.
Повний текст джерелаLi, Bao-Hong, Kun Zhen, and Yin-Liang Zhao. "Symmetrically Oblivious Envelope Protocol." In 2009 IEEE International Conference on e-Business Engineering. IEEE, 2009. http://dx.doi.org/10.1109/icebe.2009.37.
Повний текст джерела"HOST IDENTITY PROTOCOL PROXY." In 2nd International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2005. http://dx.doi.org/10.5220/0001409002220230.
Повний текст джерелаJiang, Nan, Xiang-dong Liu, Jing-ying Zhao, and De-li Yang. "A Mobile Micropayment Protocol Based on Chaos." In 2009 Eighth International Conference on Mobile Business. IEEE, 2009. http://dx.doi.org/10.1109/icmb.2009.55.
Повний текст джерелаHou, Fangtian, Cheng Yang, Jianbo Liu, Yichun Zhang, Jiayin Tian, and Yakun Zhang. "HB-MAP Protocol: A New Secure Bidirectional Light-Wight Authentication Protocol of HB." In 2012 IEEE 9th International Conference on e-Business Engineering (ICEBE). IEEE, 2012. http://dx.doi.org/10.1109/icebe.2012.33.
Повний текст джерелаKhan, Rais, Ansari Mohammad Nabi Azad S., and Anilkumar Vishwakarma. "Enhancement of manet routing protocol." In 2014 Conference on IT in Business, Industry and Government (CSIBIG). IEEE, 2014. http://dx.doi.org/10.1109/csibig.2014.7056979.
Повний текст джерелаLiu, Li, and Xiaoju Li. "Watermarking Protocol for Broadcast Monitoring." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.414.
Повний текст джерелаBîrjoveanu, Cătălin, and Mirela Bîrjoveanu. "Multi-party E-Commerce Protocol for B2C/B2B Applications." In 16th International Conference on e-Business. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0007956801640171.
Повний текст джерелаMeng, Bo. "Analyzing and Improving Internet Voting Protocol." In IEEE International Conference on e-Business Engineering (ICEBE'07). IEEE, 2007. http://dx.doi.org/10.1109/icebe.2007.13.
Повний текст джерелаZhang, Zhen, Shijie Zhou, and Zongwei Luo. "Design and Analysis for RFID Authentication Protocol." In 2008 IEEE International Conference on e-Business Engineering. IEEE, 2008. http://dx.doi.org/10.1109/icebe.2008.92.
Повний текст джерелаЗвіти організацій з теми "Business protocol"
JA Edmonds, CN MacCracken, RD Sands, and SH Kim. UNFINISHED BUSINESS: The Economics of The Kyoto Protocol. Office of Scientific and Technical Information (OSTI), July 2000. http://dx.doi.org/10.2172/757660.
Повний текст джерела