1. Understanding Reference Models and Reference Architectures ...
  2. Architecture Decisions - UT Dallas
  3. Business Intelligence - RESER
  4. DPW Technical Architecture v1.4 - DC.gov
  5. A Reference Model for Anti-Money Laundering in the Financial Sector
  6. An Introduction to the Business Model for Information Security - isaca
  7. Introduction to Application Servers - NYU
  8. Netezza Presentation - Semantic Scholar
  9. Getting Started with IBM API Connect: Concepts and Architecture ...
  10. Data Flow Diagrams - NYU
  11. Full Text PDF - Science and Education Publishing
  12. Towards a Business-IT Alignment Maturity Model for ... - CiteSeerX
  13. Cloud Computing Models - MIT
  14. Big data: changing the way businesses compete and operate - EY
  15. Handbook on Business Process Management 1 - icdst
  16. Towards a Model Driven Architecture Approach within an Identity ...
  17. Meta Architecture for Intelligent Information Systems
  18. Abstract: General: Policy - Office of Administration - PA.gov
  19. National Institute of Standards and Technology (NIST)
  20. W32.Stuxnet Dossier - Symantec
  21. IT Strategy 2015-2018 - University of West London
  22. Linking the IT Balanced Scorecard to the Business ... - Template.net
  23. Significance of Data Warehousing and Data Mining in Business ...
  24. Benefits Overview - Elastic Path
  25. IBM Cognos Business Intelligence V10.1 Handbook - IBM Redbooks
  26. Analysis of Data Virtualization & Enterprise Data ... - MIT
  27. BUSINESS PROCESS WAREHOUSE FOR ... - Semantic Scholar
  28. Security in Development: The IBM Secure ... - IBM Redbooks
  29. Software Engineering Fundamentals - NYU
  30. Abstract Introduction BEYOND CORBA MODEL DRIVEN - Object ...
  31. Solving Big Data Challenges for Enterprise Application Performance ...
  32. The Merit of XML as an Architecture Description Language Meta ...
  33. Architecture Famework and Components of the Big ... - UAZone.org
  34. Towards a Unified University Information System - CiteSeerX
  35. Cloud Computing Tutorial - Tutorialspoint
  36. SAP R/3 - TutorialsPoint
  37. Visualization of Linked Enterprise Data - CEUR Workshop ...
  38. A Goal-Directed Modeling Technique towards Business Process
  39. Recommended Practice - ICS-CERT - US-CERT
  40. Naked objects - Apache Isis
  41. Toward a Pattern Language for a Allocation View in SOA
  42. Software Architecture and Design - index-of.es
  43. IT Governance
  44. SAP® BusinessObjects™ EDGE - icdst
  45. flow, process, fold: intersections in ... - Stanford University
  46. ITS Organization Chart - icdst
  47. a unified control architecture for packet and - McKeown Group
  48. CAPLAN: An Accessible, Flexible and Scalable Semantification ...
  49. IBM FlashSystem V9000 Product Guide - IBM Redbooks
  50. Building an integrated CBR-Big Data Architecture based on SEASALT
  51. Revenue Recognition Engine - Aptitude Software
  52. A Formal Approach for Internal Controls Compliance in Business ...
  53. Formalization of the IT Audit Management Process Engenharia ...
  54. IBM AIX Enterprise Edition System Administration ... - IBM Redbooks
  55. Introduction to Apache Cassandra - DataStax
  56. FOH Chapter 22 - United States Department of Labor
  57. Chapter 1. Introduction to Document Engineering - icdst
  58. FY 2014-2020 VA Strategic Plan Draft - Joint Chiefs of Staff
  59. Big Data in Big Companies - Bitpipe
  60. Big Data Analytics Options on AWS
  61. AN INNOVATION SYSTEMS MODEL Using the ... - IC2 Institute
  62. Mobile Security - TutorialsPoint
  63. Securing Enterprise Applications: Service ... - Semantic Scholar
  64. Chapter 4. Describing What Businesses Do and How They Do It - icdst
  65. A Security Architecture for Survivability ... - Semantic Scholar
  66. Implementation of Data Mining and Data Warehousing In E ...
  67. Laboratory Information Management System - UCL Computer Science
  68. untitledMeasuring and Improving IT Governance ... - CiteSeerX
  69. Integrating Architectural Views in UML - USC CSSE - University of ...
  70. ISO/IEC JTC 1
  71. Social Business: Amplify the value of human connections - IBM
  72. A structured approach to improving business intelligence - Compact.nl
  73. TPC-H 10TB Benchmark Result for System x3850 X6 - icdst
  74. A Literature Review of Business/IT Alignment Strategies - Core
  75. Over 39 years of Electrical Engineering, Lighting ... - Silverman & Light
  76. Associate Vice Chancellor for Campus IT and CIO Sept. 8, 2016
  77. master of digital transformation management - Goethe Business ...
  78. Frameworks For Component-Based Client/Server ... - CiteSeerX
  79. Modularization of the Learning Architecture - Skolan för elektroteknik ...
  80. Big Data Analytics for Security Intelligence - Cloud Security Alliance
  81. 120GB, 240GB, 480GB, 800GB SATA MLC Enterprise ... - Lenovo
  82. Information Security and Privacy in Healthcare - Institute for Security ...
  83. Online College Magazine - Wisc
  84. IMPACTS OF SYSTEM OF SYSTEM MANAGEMENT ... - USC CSSE
  85. Evaluating IT Governance Practices and Business and IT ... - Core
  86. Component-Based Software Engineering - Semantic Scholar
  87. IK2555 Mobile and Wireless Network Architectures - KTH
  88. Introduction - IBM
  89. Symantec - Data Sheet
  90. No Longer Just a Hole in the Ground The Adaptive Re-Use - MIT
  91. An Evaluation of Service Development in e ... - Semantic Scholar
  92. A Cloud Robotics Architecture with Applications ... - Semantic Scholar
  93. A Decade of Generating Higher Value at IBM
  94. Applying Design Methodology to Software Development - UiO
  95. Managing Big Data - Twin Ports SAS Users
  96. Migration from Copper to Fiber Access Network using - arXiv
  97. Your one-stop solutions provider across the region. If you are - icdst
  98. Form 8-K (2015 10-K Segment Recast) - IBM
  99. Encryption Algorithm for Data Security and Privacy in - iMedPub
  100. Business & Finance - Wiley

All rights reserved for ICDST 2017-2019