Sciweavers

175 search results - page 16 / 35
» Enterprise Computing Systems as Information Factories
Sort
View
AEI
2007
119views more  AEI 2007»
13 years 8 months ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
ESORICS
2011
Springer
12 years 8 months ago
Automated Information Flow Analysis of Virtualized Infrastructures
The use of server virtualization has been growing steadily, but many enterprises still are reluctant to migrate critical workloads to such infrastructures. One key inhibitor is the...
Sören Bleikertz, Thomas Groß, Matthias ...
PERSUASIVE
2010
Springer
13 years 6 months ago
Animate Objects: How Physical Motion Encourages Public Interaction
The primary challenge for information terminals, kiosks, and incidental use systems of all sorts, is that of getting the “first click” from busy passersby. This paper presents ...
Wendy Ju, David Sirkin
IPPS
2007
IEEE
14 years 2 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
ATAL
2007
Springer
14 years 12 days ago
Towards reflective mobile agents for resource-constrained mobile devices
The vision of ubiquitous computing is one in which resource constrained mobile devices form ad-hoc networks to enable the delivery of services that are sensitive and responsive to...
Conor Muldoon, Gregory M. P. O'Hare, John F. Bradl...