Sciweavers

2454 search results - page 293 / 491
» Privacy in the Information and Communications Technologies
Sort
View
WECWIS
2005
IEEE
201views ECommerce» more  WECWIS 2005»
15 years 7 months ago
A Categorization of Collaborative Business Process Modeling Techniques
Business Process Modeling (BPM) is one of the key factors in defining service-oriented solutions for business collaborations. Like in traditional software engineering there is a n...
Stephan Roser, Bernhard Bauer
CAISE
2005
Springer
15 years 7 months ago
Development of a formal REA-ontology Representation
Business domain ontologies offer great opportunities for facilitating communication between people in business, for improving the enterprise system engineering processes and for cr...
Frederik Gailly, Geert Poels
ICCS
2005
Springer
15 years 7 months ago
A Courseware Development Methodology for Establishing Practice-Based Network Course
Abstract. In this paper, we present a practice-based courseware development methodology for establishing a senior undergraduate network course for the computer-engineering departme...
Jahwan Koo, Seong-Jin Ahn
ISW
2005
Springer
15 years 7 months ago
Constant Round Dynamic Group Key Agreement
We present a fully symmetric constant round authenticated group key agreement protocol in dynamic scenario. Our proposed scheme achieves forward secrecy and is provably secure und...
Ratna Dutta, Rana Barua
CAISE
2004
Springer
15 years 7 months ago
Why we understand each other: the role of the context
This short paper addresses the problem of mutual understanding from an anthropomorphic point of view, highlighting the underlying basic mechanisms and principles. Then the paper ex...
G. Andrighetto, Pierluigi Assogna