Sciweavers

2309 search results - page 184 / 462
» Patterns for Technology Companies
Sort
View
EMISA
2009
Springer
15 years 11 months ago
Controlled Flexibility and Lifecycle Management of Business Processes through Extensibility
Companies employ business process management suites to model, run, and maintain their processes. These processes are required to comply with requirements originating from standards...
Sören Balko, Arthur H. M. ter Hofstede, Alist...
LOCA
2009
Springer
15 years 11 months ago
Location Diversity: Enhanced Privacy Protection in Location Based Services
Abstract. Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding t...
Mingqiang Xue, Panos Kalnis, Hung Keng Pung
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
15 years 11 months ago
A Cross-Cultural Comparison of Perceived Strategic Importance of RFID for CIOs in Germany and Italy
Purpose: Drawing from literature on innovation, strategy and culture the objective of this study is to explore the role of perceived potentials and perceived strategic importance ...
Stefanie Jahner, Jan Marco Leimeister, Uta Franzis...
HICSS
2008
IEEE
151views Biometrics» more  HICSS 2008»
15 years 11 months ago
A Conceptual Framework of Transactive Networks System
A virtual organization is a temporary network of companies, which implies the potential opportunity to learn and share abundant sources of complementary and compatible knowledge p...
Sheng-cheng Lin, Yu-Min Wang, Daniel Y. Shee
ICEIS
2008
IEEE
15 years 11 months ago
Internal Fraud Risk Reduction - Results of a Data Mining Case Study
Corporate fraud these days represents a huge cost to our economy. Academic literature already concentrated on how data mining techniques can be of value in the fight against frau...
Mieke Jans, Nadine Lybaert, Koen Vanhoof