Sciweavers

2309 search results - page 112 / 462
» Patterns for Technology Companies
Sort
View
EKAW
2004
Springer
15 years 9 months ago
ConEditor: Tool to Input and Maintain Constraints
We present a tool which helps domain experts capture and maintain constraints. The tool displays parts of an ontology (as classes, sub-classes and properties) in the form of a tree...
Suraj Ajit, Derek H. Sleeman, David W. Fowler, Dav...
ACMICEC
2007
ACM
303views ECommerce» more  ACMICEC 2007»
15 years 8 months ago
Impact of social influence in e-commerce decision making
Purchasing decisions are often strongly influenced by people who the consumer knows and trusts. Moreover, many online shoppers tend to wait for the opinions of early adopters befo...
Young Ae Kim, Jaideep Srivastava
CACM
2002
145views more  CACM 2002»
15 years 4 months ago
Digital city Kyoto
Abstract. We have developed a digital city for Kyoto, the old capital and cultural center of Japan, as a social information infrastructure for urban everyday life including shoppin...
Toru Ishida
CAISE
2009
Springer
15 years 11 months ago
Pattern Mining in System Logs: Opportunities for Process Improvement
Enterprise systems implementations are often accompanied by changes in the business processes of the organizations in which they take place. However, not all the changes are desira...
Dolev Mezebovsky, Pnina Soffer, Ilan Shimshoni
SECURWARE
2008
IEEE
15 years 10 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...