Sciweavers

1213 search results - page 134 / 243
» Enterprise information portals
Sort
View
COMAD
2009
13 years 9 months ago
When to Trigger Active Rules?
Active rules model and enforce enterprise requirements such as situation monitoring using events, conditions and actions. These rules are termed active rules as they make the unde...
Raman Adaikkalavan, Sharma Chakravarthy
COMAD
2009
13 years 9 months ago
Consistency of Databases on Commodity Disk Drives
Most database systems use ARIES-like logging and recovery scheme to recover from failures and guarantee transactional consistency. ARIES relies on the Write-Ahead Logging (WAL) pr...
Robin Dhamankar, Hanuma Kodavalla, Vishal Kathuria
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 9 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
SAC
2006
ACM
13 years 8 months ago
Generating correct EPCs from configured C-EPCs
Process reference models play an important role for the alignment and configuration of commercial off-the-shelf Enterprise Systems to requirements of an organization. Recently, Co...
Jan Mendling, Jan Recker, Michael Rosemann, Wil M....
CHI
2009
ACM
14 years 8 months ago
Supporting carers in their caring role through design
Carers are people who look after family, partners or friends who could not manage without them because of frailness, illness or disability. Our contribution is to show the potenti...
Andrea Taylor, Richard Wilson, Stefan Agamanolis