Sciweavers

181 search results - page 27 / 37
» Wizard-based process modeling for business users
Sort
View
ICEBE
2007
IEEE
151views Business» more  ICEBE 2007»
15 years 3 months ago
Systematic Security Analysis for Service-Oriented Software Architectures
Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a ...
Yanguo Liu, Issa Traoré
77
Voted
JIIS
2002
118views more  JIIS 2002»
14 years 9 months ago
Authorization and Access Control of Application Data in Workflow Systems
: Workflow Management Systems (WfMSs) are used to support the modeling and coordinated execution of business processes within an organization or across organizational boundaries. A...
Shengli Wu, Amit P. Sheth, John A. Miller, Zongwei...
ICASSP
2009
IEEE
15 years 4 months ago
Leveraging multiple query logs to improve language models for spoken query recognition
A voice search system requires a speech interface that can correctly recognize spoken queries uttered by users. The recognition performance strongly relies on a robust language mo...
Xiao Li, Patrick Nguyen, Geoffrey Zweig, Dan Bohus
CAISE
2007
Springer
15 years 3 months ago
Conceptual Modeling of Privacy-Aware Web Service Protocols
Abstract. Internet users are becoming increasingly concerned about their personal information being collected and used by Web service providers. They want to ensure that it is stor...
Rachid Hamadi, Hye-Young Paik, Boualem Benatallah
80
Voted
EDOC
2003
IEEE
15 years 2 months ago
Compensation is Not Enough
– An important problem in designing infrastructure to support business-to-business integration (B2Bi) is how to cancel a long-running interaction (either because the user has cha...
Paul Greenfield, Alan Fekete, Julian Jang, Dean Ku...