Sciweavers

381 search results - page 46 / 77
» Business Informatics: An Engineering Perspective on Informat...
Sort
View
128
Voted
DAMON
2006
Springer
15 years 4 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
105
Voted
CAISE
2009
Springer
14 years 10 months ago
Developing Quality Management Systems with DEMO
The International Organization for Standardization (ISO) has defined Quality Management, but it has not yet adopted standards for developing Quality Management Systems (QMSs), nota...
Jos Geskus, Jan L. G. Dietz
66
Voted
CAISE
2008
Springer
15 years 2 months ago
Method Tailoring as Negotiation
The need for method tailoring is widely accepted in the field of information systems development methods. Today much attention has been devoted to viewing method tailoring either a...
Fredrik Karlsson
CISIS
2009
IEEE
15 years 5 months ago
The Role of Service Oriented Architecture in Telemedicine Healthcare System
Interoperability in telemedicine system is one of the major concern in telemedicine health care system. It is difficult to design exact and flexible interoperable architecture i...
Asadullah Shaikh, Muniba Shoukat Memon, Nasrullah ...
137
Voted
ICSE
2003
IEEE-ACM
15 years 5 months ago
Tool Support for Scenario-Based Architecture Evaluation
Architectural considerations play a key role in the success of any software-based development project. Architecture evaluation is an early risk reduction method for identifying ri...
Steffen Thiel, Andreas Hein, Heiner Engelhardt