Sciweavers

1534 search results - page 244 / 307
» A Business Process Explorer: Recovering Business Processes f...
Sort
View
KDD
2010
ACM
282views Data Mining» more  KDD 2010»
13 years 11 months ago
Optimizing debt collections using constrained reinforcement learning
In this paper, we propose and develop a novel approach to the problem of optimally managing the tax, and more generally debt, collections processes at financial institutions. Our...
Naoki Abe, Prem Melville, Cezar Pendus, Chandan K....
ACSW
2007
13 years 9 months ago
A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services
Over the past years Mobile Business has gained significant progress not only because of higher transfer rates as well as advanced processing power and memory capabilities of netw...
Oliver Jorns, Gerald Quirchmayr, Oliver Jung
PDCAT
2005
Springer
14 years 1 months ago
An Agile Programming Model for Grid End Users
Grid and service computing technologies have been explored by enterprises to promote integration, sharing, and collaboration. However, quick response to business environment chang...
Zhiwei Xu, Chengchun Shu, Haiyan Yu, Haozhi Liu
HICSS
2002
IEEE
154views Biometrics» more  HICSS 2002»
14 years 19 days ago
Designing Effective Incentive-Oriented Outsourcing Contracts for ERP Systems
Information systems outsourcing has been viewed as an attractive option by many senior managers generally because of the belief that IS outsourcing vendors can achieve economies o...
Kweku-Muata Bryson, William E. Sullivan
CASCON
2001
92views Education» more  CASCON 2001»
13 years 9 months ago
Extending the message flow debugger for MQSI
Integration and management of applications play key roles in today's computing. MQSeries is an asynchronous, assured application-to-application communication protocol designe...
Shuxia Tan, Eshrat Arjomandi, Richard F. Paige, Ev...