Sciweavers

21490 search results - page 425 / 4298
» Business Process Modeling
Sort
View
INAP
2001
Springer
15 years 8 months ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
TSE
2002
83views more  TSE 2002»
15 years 3 months ago
Optimum Control Limits for Employing Statistical Process Control in Software Process
There is an increased interest in using control charts for monitoring and improving software processes, particularly quality control processes like reviews and testing. In a contro...
Pankaj Jalote, Ashish Saxena
CHI
2002
ACM
16 years 4 months ago
Automated message prioritization: making voicemail retrieval more efficient
Navigating through new voicemail messages to find messages of interest is a time-consuming task, particularly for high-volume users. When checking messages under a time constraint...
Meridith Ringel, Julia Hirschberg
HICSS
2002
IEEE
98views Biometrics» more  HICSS 2002»
15 years 9 months ago
International Electronic Government Approaches
The most apparent proof of changes in the public sector because of modern information and communication technologies are electronic services like general onlineinformation procure...
Birgit J. Oberer
VLDB
2001
ACM
113views Database» more  VLDB 2001»
15 years 8 months ago
Querying XML Views of Relational Data
XML has emerged as the standard data exchange format for Internet-based business applications. This has created the need to publish existing business data, stored in relational da...
Jayavel Shanmugasundaram, Jerry Kiernan, Eugene J....