Sciweavers

2653 search results - page 479 / 531
» Business process reengineering
Sort
View
ACSW
2007
13 years 9 months ago
A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services
Over the past years Mobile Business has gained significant progress not only because of higher transfer rates as well as advanced processing power and memory capabilities of netw...
Oliver Jorns, Gerald Quirchmayr, Oliver Jung
CASCON
2008
137views Education» more  CASCON 2008»
13 years 9 months ago
Automating SLA modeling
Service Level Agreements (SLAs) define the level of service that a service provider must deliver. An SLA is a contract between service provider and consumer, and includes appropri...
Tony Chau, Vinod Muthusamy, Hans-Arno Jacobsen, El...
LREC
2010
132views Education» more  LREC 2010»
13 years 9 months ago
Hungarian Dependency Treebank
Herein, we present the process of developing the first Hungarian Dependency TreeBank. First, short references are made to dependency grammars we considered important in the develo...
Veronika Vincze, Dóra Szauter, Attila Alm&a...
DGO
2007
134views Education» more  DGO 2007»
13 years 9 months ago
Control patterns in a healthcare network
To keep a network of enterprises sustainable, inter-organizational control measures are needed to detect or prevent opportunistic behaviour of network participants. We present a m...
Vera Kartseva, Joris Hulstijn, Jaap Gordijn, Yao-H...
ICWSM
2008
13 years 9 months ago
Wikipedia as an Ontology for Describing Documents
Identifying topics and concepts associated with a set of documents is a task common to many applications. It can help in the annotation and categorization of documents and be used...
Zareen Saba Syed, Tim Finin, Anupam Joshi