Sciweavers

464 search results - page 48 / 93
» Management Insights
Sort
View
CAISE
2010
Springer
14 years 10 months ago
Beyond Process Mining: From the Past to Present and Future
Abstract. Traditionally, process mining has been used to extract models from event logs and to check or extend existing models. This has shown to be useful for improving processes ...
Wil M. P. van der Aalst, Maja Pesic, Minseok Song
PERCOM
2009
ACM
15 years 4 months ago
Localizing Jammers in Wireless Networks
Abstract—Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not ...
Hongbo Liu, Wenyuan Xu, Yingying Chen, Zhenhua Liu
149
Voted
SJ
2011
14 years 4 months ago
Analyzing the Resilience of Complex Supply Network Topologies Against Random and Targeted Disruptions
—In this paper, we study the resilience of supply networks against disruptions and provide insights to supply chain managers on how to construct a resilient supply network from t...
Kang Zhao, Akhil Kumar, Terry P. Harrison, John Ye...
HICSS
2006
IEEE
110views Biometrics» more  HICSS 2006»
15 years 3 months ago
Risk Factors in Distributed Projects
In this manuscript we develop a conceptual understanding of how key risk factors associated with Information Technology development projects are magnified or multiplied when deali...
James M. Erickson, Roberto Evaristo
68
Voted
TPDS
2010
93views more  TPDS 2010»
14 years 8 months ago
On the Interplay of Parallelization, Program Performance, and Energy Consumption
—This paper derives simple, yet fundamental formulas to describe the interplay between parallelism of an application, program performance, and energy consumption. Given the ratio...
Sangyeun Cho, Rami G. Melhem