Sciweavers

858 search results - page 74 / 172
» BMM: A Business Modeling Method For Information Systems Deve...
Sort
View
HICSS
2006
IEEE
139views Biometrics» more  HICSS 2006»
14 years 2 months ago
Benefit and Pricing of Spatio-Temporal Information in Mobile Peer-to-Peer Networks
In this paper we examine the dissemination of reports about resources in mobile peer-to-peer networks, where moving objects communicate with each other via short-range wireless tr...
Bo Xu, Ouri Wolfson, Naphtali Rishe
EDOC
2006
IEEE
14 years 2 months ago
Exploring Intentional Modeling and Analysis for Enterprise Architecture
— An enterprise architecture is intended to be a comprehensive blueprint describing the key components and relationships for an enterprise from strategies to business processes t...
Eric S. K. Yu, Markus Strohmaier, Xiaoxue Deng
ACSAC
2005
IEEE
14 years 1 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
CSREAEEE
2006
103views Business» more  CSREAEEE 2006»
13 years 9 months ago
Software Engineering Employee Motivational Capital Model: SE-EMCM
The business world has been reinventing the human. Employee participative transition projects for management strategies are becoming more important in IT organizations day by day....
Serdar Turkeli
CIARP
2003
Springer
14 years 1 months ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...