Sciweavers

177 search results - page 25 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
JDCTA
2010
111views more  JDCTA 2010»
14 years 8 months ago
Internet as a "point of synergy" between communication and distribution: hypothesis of model applied to tourism
The wide diffusion of new technologies in communication and business has changed how consumer and product/store knowledge has to be managed and represented digitally. This issue h...
Pierpaolo Singer, Maria Antonella Ferri, Lucia Aie...
AGILEDC
2007
IEEE
15 years 8 months ago
Growing a Build Management System from Seed
This paper describes the authors’ experiences creating a full Build Management System from a simple Version Control System. We will explore how the XP values of simplicity, feed...
Narti Kitiyakara, Joseph Graves
123
Voted
CROSSROADS
2010
14 years 8 months ago
Massive multiplayer human computation for fun, money, and survival
Crowdsourcing is an effective tool to solve hard tasks. By bringing 100,000s of people to work on simple tasks that only humans can do, we can go far beyond traditional models of ...
Lukas Biewald
ACMICEC
2003
ACM
113views ECommerce» more  ACMICEC 2003»
15 years 7 months ago
PayCash: a secure efficient Internet payment system
This paper describes PayCash, an Internet payment system that was designed to offer strong security and privacy protection. This system is based on the concept of electronic cash,...
Jon M. Peha, Ildar M. Khamitov
ECIS
2004
15 years 3 months ago
A conceptual framework of e-fraud control in an integrated supply chain
The integration of supply chains offers many benefits; yet, it may also render organisations more vulnerable to electronic fraud (e-fraud). E-fraud can drain on organisations'...
Lucian Vasiu