Sciweavers

115 search results - page 12 / 23
» On Information Flow Forensics in Business Application Scenar...
Sort
View
HICSS
1999
IEEE
78views Biometrics» more  HICSS 1999»
15 years 1 months ago
A Structured Transformation Approach for Legacy Information Systems - A Cash Receipts/Reimbursements Example
Legacy information systems are difficult to transform into the new or upgraded information systems. Part of the reason is being the incompatibility and the unscalability between t...
Jia-Lang Seng, Wayne Tsai
CAISE
2006
Springer
15 years 1 months ago
Integration of heterogeneous BPM Schemas: The Case of XPDL and BPEL
Heterogeneous Business Process Modeling (BPM) schemas have been a problem for business process management throughout the last couple of years. Although there are several standardiz...
Thomas Hornung, Agnes Koschmider, Jan Mendling
DOCENG
2008
ACM
14 years 11 months ago
Interactive office documents: a new face for web 2.0 applications
As the world wide web transforms from a vehicle of information dissemination and e-commerce transactions into a writable nexus of human collaboration, the Web 2.0 technologies at ...
John M. Boyer
LISA
2004
14 years 10 months ago
Meta Change Queue: Tracking Changes to People, Places, and Things
Managing information flow between different parts of the enterprise information infrastructure can be a daunting task. We have grown too large to send the complete lists around an...
Jon Finke
EUROMICRO
2004
IEEE
15 years 1 months ago
Towards an Event-Driven Workplace for Knowledge Integration
A contemporary office or knowledge worker has to deal with an ever increasing number of information channels and associated flows of events (i.e., software applications using vary...
Alexander Schatten, Stefan Biffl