Sciweavers

736 search results - page 145 / 148
» Business process management: Where business processes and we...
Sort
View
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
13 years 10 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
KDD
2005
ACM
125views Data Mining» more  KDD 2005»
14 years 1 months ago
Price prediction and insurance for online auctions
Online auctions are generating a new class of fine-grained data about online transactions. This data lends itself to a variety of applications and services that can be provided to...
Rayid Ghani
SIGUCCS
2003
ACM
14 years 23 days ago
Training program growth...: from flat line to pulsating
IT Training and Communications is a division of Information Technology Services (ITS), which provides computer application training for the faculty and staff at Saint Louis Univer...
Sue A. Moore
ECMDAFA
2007
Springer
122views Hardware» more  ECMDAFA 2007»
14 years 1 months ago
Model Transformation from OWL-S to BPEL Via SiTra
Although there are a large number of academic and industrial model transformation frameworks available, allowing specification, implementation, maintenance and documentation of mod...
Behzad Bordbar, Gareth Howells, Michael Evans, Ath...
FSKD
2006
Springer
298views Fuzzy Logic» more  FSKD 2006»
13 years 11 months ago
Risk Assessment of E-Commerce Projects Using Evidential Reasoning
The purpose of this study is to develop a decision making system to evaluate the risks in E-Commerce (EC) projects. Competitive software businesses have the critical task of assess...
Rashid Hafeez Khokhar, David A. Bell, Jiwen Guan, ...