— The security of corporate business processes is crucial for the business success of companies. Existing Business Process Management methodologies barely consider security and d...
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Abstract. In enterprise application development and other software construction projects, a critical success factor is to make sound architectural decisions. Text templates and too...
Olaf Zimmermann, Thomas Gschwind, Jochen Malte K&u...
Abstract. Nowadays enterprises request information technologies that leverage structured and unstructured information for providing a single integrated view of business problems in...
Linked or networked data are ubiquitous in many applications. Examples include web data or hypertext documents connected via hyperlinks, social networks or user profiles connected...
Jing Gao, Feng Liang, Wei Fan, Chi Wang, Yizhou Su...