Sciweavers

ICEB
2004
297views Business» more  ICEB 2004»
13 years 6 months ago
Security Measures in Mobile Commerce: Problems and Solutions
Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as wel...
Sanwar Ali, Waleed Farag, Mohammad A. Rob
IFIP11
2004
141views Business» more  IFIP11 2004»
13 years 6 months ago
Identity Management for Self-Portrayal
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
Tobias Baier, Christian P. Kunze
ICETE
2004
253views Business» more  ICETE 2004»
13 years 6 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
ICEB
2004
242views Business» more  ICEB 2004»
13 years 6 months ago
PATSEEK: Content Based Image Retrieval System for Patent Database
A patent always contains some images along with the text. Many text based systems have been developed to search the patent database. In this paper, we describe PATSEEK that is an ...
Avinash Tiwari, Veena Bansal
BPM
2004
Springer
95views Business» more  BPM 2004»
13 years 8 months ago
On Dealing with Structural Conflicts between Process Type and Instance Changes
Abstract. Adaptive process management systems must be able to support changes of single process instances as well as modifications at the process type level and their propagation t...
Stefanie Rinderle, Manfred Reichert, Peter Dadam
Business
Top of PageReset Settings