Sciweavers

57 search results - page 11 / 12
» Interactive Credential Negotiation for Stateful Business Pro...
Sort
View
CONCURRENCY
2006
143views more  CONCURRENCY 2006»
14 years 11 months ago
A Grid workflow infrastructure
In this paper we propose a Grid Workflow Infrastructure, which serves as the base for specifying and executing collaborative interactive workflows within computational grids. The ...
Dieter Cybok
CHI
2007
ACM
16 years 1 days ago
Studying activity patterns in CSCW
We study small distributed work groups capturing, managing, and reusing knowledge in a collaborative activity. We conceive this process as adaptation of a group to an activity and...
Gregorio Convertino, Thomas P. Moran, Barton A. Sm...
80
Voted
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
15 years 4 months ago
Knowledge-Based IS Implementation Support: An Application to the IS Change Agent Role Problem
The threat of abandoned or extensively overhauled IS is a major concern for both MIS specialists and businesses. This concern may stem from the mismatch between MIS specialist cha...
Meral Binbasioglu, Elaine Winston
COMPSAC
2003
IEEE
15 years 5 months ago
Just What Could Possibly Go Wrong In B2B Integration?
One important trend in enterprise-scale IT has been the increasing use of business-to-business integration (B2Bi) technologies to automate business processes that cross organisati...
Dean Kuo, Alan Fekete, Paul Greenfield, Julian Jan...
95
Voted
DSS
2007
226views more  DSS 2007»
14 years 11 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri