Sciweavers

155 search results - page 17 / 31
» Business process mining: An industrial application
Sort
View
CORR
2010
Springer
90views Education» more  CORR 2010»
14 years 9 months ago
RFID Applications: An Introductory and Exploratory Study
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use R...
Kamran Ahsan, Hanifa Shah, Paul Kingston
GRID
2004
Springer
15 years 2 months ago
High-Level Grid Application Environment to Use Legacy Codes as OGSA Grid Services
One of the biggest obstacles in the wide-spread industrial take-up of Grid technology is the existence of a large amount of legacy code that is not accessible as Grid services. Th...
Péter Kacsuk, Ariel Goyeneche, Thierry Dela...
CCS
2006
ACM
15 years 1 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
IAJIT
2008
120views more  IAJIT 2008»
14 years 9 months ago
A SCOR Reference Model of the Supply Chain Management System in an Enterprise
Abstract: State-of-the-art supply chain management systems can be obtained from the supply chain operations referencemodel for business applications, advancement and practices. Pro...
Danish Irfan, Xiaofei Xu, Shengchun Deng, Zengyou ...
IJCAI
2003
14 years 11 months ago
A Method for Semantically Enhancing the Service Discovery Capabilities of UDDI
The promise of dynamic selection of business services and automatic integration of applications written to Web Services standards is yet to be realized. This is partially attribut...
Rama Akkiraju, Richard Goodwin, Prashant Doshi, Sa...