Sciweavers

9 search results - page 2 / 2
» icebe 2009
Sort
View
ICEBE
2009
IEEE
157views Business» more  ICEBE 2009»
13 years 2 months ago
Trust-Based Access Control for Privacy Protection in Collaborative Environment
Privacy has been acknowledged to be a critical requirement for many business environments. A variety of uncertainty and mutability poses challenges when sharing resources must happ...
Min Li, Hua Wang, David Ross
ICEBE
2009
IEEE
136views Business» more  ICEBE 2009»
13 years 2 months ago
Virtual Wealth Realization in Virtual and Real Worlds
This paper has investigated the issue of virtual wealth and its realization in both real and virtual worlds, and argued that the realization of virtual wealth is necessary and pos...
Jingzhi Guo, Angelina Chow, Zhiguo Gong, Chengzhen...
ICEBE
2009
IEEE
118views Business» more  ICEBE 2009»
13 years 2 months ago
Temporal Exception Prediction for Loops in Resource Constrained Concurrent Workflows
Workflow management systems (WfMS) are widely used for improving business processes and providing better quality of services. However, rapid changes in business environment can ca...
Iok-Fai Leong, Yain-Whar Si
ICEBE
2009
IEEE
147views Business» more  ICEBE 2009»
13 years 11 months ago
The Design and Implementation of Service Reservations in Real-Time SOA
—Service-oriented architecture (SOA) provides the flexibility of dynamically composing business processes in enterprise computing. However, they must be enhanced to support real...
Mark Panahi, Weiran Nie, Kwei-Jay Lin