Sciweavers

5494 search results - page 997 / 1099
» E-services Management Requirements
Sort
View
BTW
2009
Springer
114views Database» more  BTW 2009»
15 years 7 months ago
Value Demonstration of Embedded Analytics for Front Office Applications
: Users of front office applications such as call center or customer support applications make millions and millions of decisions each day without analytical support. For example, ...
Erik Nijkamp, Martin Oberhofer, Albert Maier
95
Voted
EMISA
2009
Springer
15 years 7 months ago
A Thing Called "Fluid Process" - Beyond Rigidity in Business Process
: This keynote reports on a new class of processes - so called fluid processes - whose ”engineering” and ”use” is indistinguishable. Fluid processes are continually being ...
Manfred Reichert
108
Voted
EUROSSC
2009
Springer
15 years 7 months ago
Time-Lag as Limiting Factor for Indoor Walking Navigation
Several navigation situations can be imagined where visual cueing is not practical or unfeasible, and where the hands are required exclusively for a certain task. The utilization o...
Andreas Riener, Markus Straub, Alois Ferscha
EUROSSC
2009
Springer
15 years 7 months ago
Semantic Rules for Context-Aware Geographical Information Retrieval
Geographical information retrieval (GIR) can benefit from context information to adapt the results to a user’s current situation and personal preferences. In this respect, seman...
Carsten Keßler, Martin Raubal, Christoph Wos...
106
Voted
FC
2009
Springer
104views Cryptology» more  FC 2009»
15 years 7 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp