Sciweavers

2653 search results - page 351 / 531
» Business process reengineering
Sort
View
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 8 months ago
RFID Applications: An Introductory and Exploratory Study
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use R...
Kamran Ahsan, Hanifa Shah, Paul Kingston
EOR
2006
117views more  EOR 2006»
13 years 8 months ago
Heuristics for selecting robust database structures with dynamic query patterns
The success of a company increasingly depends on timely information (internal or external) being available to the right person at the right time for crucial managerial decision-ma...
Andrew N. K. Chen, Paulo B. Goes, Alok Gupta, Jame...
IJWET
2007
91views more  IJWET 2007»
13 years 8 months ago
Performance tuning and cost discovery of mobile web-based applications
: When considering the addition of a mobile presentation channel to an existing web-based application, project managers should know how the mobile channel’s characteristics will ...
Matthias Book, Volker Gruhn, Malte Hülder, An...
TKDE
2008
177views more  TKDE 2008»
13 years 8 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
CLEIEJ
2004
95views more  CLEIEJ 2004»
13 years 8 months ago
Ontology and XML-based Specifications for Collaborative B2B Relationships
A collaborative B2B relationship implies jointly executing business processes. This relationship demands a complete access to available information and knowledge to support decisi...
María Laura Caliusco, María Rosa Gal...