Sciweavers

5333 search results - page 913 / 1067
» Business
Sort
View
SCP
2008
86views more  SCP 2008»
15 years 4 months ago
Quantifying the yield of risk-bearing IT-portfolios
We proposed a method to quantify the yield of an IT-investment portfolio in an environment of uncertainty and risk. For various common implementation scenarios such as growing dem...
R. J. Peters, Chris Verhoef
SAC
2006
ACM
15 years 4 months ago
Generating correct EPCs from configured C-EPCs
Process reference models play an important role for the alignment and configuration of commercial off-the-shelf Enterprise Systems to requirements of an organization. Recently, Co...
Jan Mendling, Jan Recker, Michael Rosemann, Wil M....
IJDE
2007
110views more  IJDE 2007»
15 years 4 months ago
iPOD Forensics Update
From student to business worker, the popularity and ubiquity of mobile devices is exploding. As these devices saturate modern culture, they continue to grow in functionality. Such...
Matthew Kiley, Tim Shinbara, Marcus Rogers
IJMTM
2007
123views more  IJMTM 2007»
15 years 4 months ago
Semantic enterprise application integration standards
Large, industry-wide interoperability projects use syntax-based standards approaches to accomplish interoperable data exchange among enterprise applications. We are investigating S...
Nenad Anicic, Zoran Marjanovic, Nenad Ivezic, Albe...
SOCA
2008
IEEE
15 years 4 months ago
Log-based mining techniques applied to Web service composition reengineering
There is no doubt that SOA and BPM will continue to evolve dependently for the next ten years. Preparing common research infrastructures will require most important efforts of web ...
Walid Gaaloul, Karim Baïna, Claude Godart