Sciweavers

606 search results - page 105 / 122
» Privacy-Enabled Services for Enterprises
Sort
View
PERCOM
2005
ACM
15 years 11 months ago
Unleashing the Power of Wearable Devices in a SIP Infrastructure
The Session Initiation Protocol (SIP) has been widely adopted for Instant Messaging (IM) and VoIP telephony both by the enterprise and in service provider systems. Till now, SIP f...
Arup Acharya, Stefan Berger, Chandrasekhar Narayan...
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
15 years 6 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
ICAC
2009
IEEE
15 years 6 months ago
Run-time correlation engine for system monitoring and testing
We present an approach and implementation for run-time correlation of large volumes of log data and symptom matching of know issues in the context of large enterprise applications...
Viliam Holub, Trevor Parsons, Patrick O'Sullivan, ...
ICSEA
2008
IEEE
15 years 6 months ago
Model-Driven Development of Human Tasks for Workflows
In order to increase efficiency, enterprises support their business processes by information technology (IT). The majority of business processes requires human interaction. By mea...
Stefan Link, Philip Hoyer, Thomas Schuster, Sebast...
ICDE
2007
IEEE
166views Database» more  ICDE 2007»
15 years 6 months ago
Enforcing Context-Sensitive Policies in Collaborative Business Environments
As enterprises seek to engage in increasingly rich and agile forms of collaboration, they are turning towards service-oriented architectures that enable them to selectively expose...
Alberto Sardinha, Jinghai Rao, Norman M. Sadeh