Sciweavers

2309 search results - page 191 / 462
» Patterns for Technology Companies
Sort
View
167
Voted
DIM
2009
ACM
15 years 9 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
162
Voted
VLDB
2001
ACM
100views Database» more  VLDB 2001»
15 years 9 months ago
Improving Business Process Quality through Exception Understanding, Prediction, and Prevention
Business process automation technologies are being increasingly used by many companies to improve the efficiency of both internal processes as well as of e-services offered to cus...
Daniela Grigori, Fabio Casati, Umeshwar Dayal, Min...
HICSS
2000
IEEE
172views Biometrics» more  HICSS 2000»
15 years 9 months ago
Sustained Knowledge Management by Organizational Culture
Preserving and fostering knowledge is the vital interest of a network-like virtual organization. The decentralized and geographically distributed organizational structure inhibits...
Birgit Lemken, Helge Kahler, Markus Rittenbruch
HICSS
2000
IEEE
156views Biometrics» more  HICSS 2000»
15 years 9 months ago
Medical Portals: Web-based Access to Medical Information
Public portals, such as Web search engines, have been available for a number of years and corporate portals that facilitate access to enterprise information within a company, norm...
Michael A. Shepherd, David Zitner, Carolyn R. Watt...
120
Voted
SIGUCCS
2000
ACM
15 years 9 months ago
New Economy, New Partnership: New DocShare
DocShare, born at SIGUCCS User Services ’95, has gone one step further in its evolution to take advantage of the new digital economy and partnership opportunity. DocShare is a c...
Keiko Pitter, Gil Gonzales, Marian Smith