Sciweavers

1995 search results - page 236 / 399
» Belief in Information Flow
Sort
View
CAISE
2006
Springer
15 years 4 months ago
Integration of heterogeneous BPM Schemas: The Case of XPDL and BPEL
Heterogeneous Business Process Modeling (BPM) schemas have been a problem for business process management throughout the last couple of years. Although there are several standardiz...
Thomas Hornung, Agnes Koschmider, Jan Mendling
99
Voted
CCS
2006
ACM
15 years 4 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
82
Voted
CIC
2004
15 years 2 months ago
Audio Quality for a Simple Forward Error Correcting Code
The aim of this paper is to study the audio quality offered by a simple Forward Error Correction (FEC) code used in audio applications like Freephone or Rat. This coding technique ...
Yvan Calas, Alain Jean-Marie
102
Voted
ECIS
2003
15 years 2 months ago
A case of 'non strategic' alignment - An IT and business unit liaison role
The nature of higher-level interactions in facilitating strategic alignment has received much attention in the past decade. The study sets out to explore the nature of the interac...
Owen Harte Barry, Brian O'Flaherty
99
Voted
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
14 years 10 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...