Sciweavers

57 search results - page 11 / 12
» Interactive Credential Negotiation for Stateful Business Pro...
Sort
View
132
Voted
CONCURRENCY
2006
143views more  CONCURRENCY 2006»
15 years 1 months ago
A Grid workflow infrastructure
In this paper we propose a Grid Workflow Infrastructure, which serves as the base for specifying and executing collaborative interactive workflows within computational grids. The ...
Dieter Cybok
CHI
2007
ACM
16 years 2 months ago
Studying activity patterns in CSCW
We study small distributed work groups capturing, managing, and reusing knowledge in a collaborative activity. We conceive this process as adaptation of a group to an activity and...
Gregorio Convertino, Thomas P. Moran, Barton A. Sm...
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
15 years 6 months ago
Knowledge-Based IS Implementation Support: An Application to the IS Change Agent Role Problem
The threat of abandoned or extensively overhauled IS is a major concern for both MIS specialists and businesses. This concern may stem from the mismatch between MIS specialist cha...
Meral Binbasioglu, Elaine Winston
102
Voted
COMPSAC
2003
IEEE
15 years 7 months ago
Just What Could Possibly Go Wrong In B2B Integration?
One important trend in enterprise-scale IT has been the increasing use of business-to-business integration (B2Bi) technologies to automate business processes that cross organisati...
Dean Kuo, Alan Fekete, Paul Greenfield, Julian Jan...
DSS
2007
226views more  DSS 2007»
15 years 1 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri