Sciweavers

1534 search results - page 158 / 307
» A Business Process Explorer: Recovering Business Processes f...
Sort
View
EJIS
2006
79views more  EJIS 2006»
13 years 9 months ago
A genealogical study of boundary-spanning IS design
This paper presents the design of a business-aligned information system (IS) from an actor-network perspective, viewing non-human intermediaries jointly as inscriptions and bounda...
Susan Gasson
ICDE
2008
IEEE
121views Database» more  ICDE 2008»
14 years 10 months ago
Optimizing Hierarchical Access in OLAP Environment
In Online Analytic Processing (OLAP) deployments, different users, lines of businesses and business units often create adhoc aggregation hierarchies tailor-made for specific report...
Lipyeow Lim, Bishwaranjan Bhattacharjee
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
14 years 3 months ago
Modular Integration Through Aspects: Making Cents of Legacy Systems
Recently, Continua Health Alliance has brought together a powerhouse team, including Cisco, IBM, Motorola and others, for personal telehealth products and services. This team will...
Celina Gibbs, Daniel Lohmann, Chunjian Robin Liu, ...
DSN
2006
IEEE
14 years 3 months ago
Designing dependable storage solutions for shared application environments
The costs of data loss and unavailability can be large, so businesses use many data protection techniques, such as remote mirroring, snapshots and backups, to guard against failur...
Shravan Gaonkar, Kimberly Keeton, Arif Merchant, W...
AGILEDC
2007
IEEE
14 years 3 months ago
Agile Program Management: Lessons Learned from the VeriSign Managed Security Services Team
This report examines how the VeriSign Managed Security Services team (MSS) has successfully extended agile software development practices to deal with a complex, multi-product dev...
Peter Hodgkins, Luke Hohmann