Sciweavers

63 search results - page 10 / 13
» Identifying the Workflow Potential of Business Processes
Sort
View
ECIS
2001
13 years 9 months ago
Planning for IS Related Industry Transformation: The Case of the 3daycar
Despite their potential to reshape business radically, information systems (IS) and information technology (IT) can be key inhibitors of industry transformation. In the automotive...
Mickey Howard, Richard T. Vidgen, Philip Powell, A...
ECIS
2003
13 years 9 months ago
E-learning and SMEs: do demand and supply speak the same language?
This paper reports on research-in-progress designed to understand adoption and diffusion of e-learning (EL) among small and medium-sized enterprises (SMEs) in northern Italy. The ...
Paola Bielli, Jane E. Klobas
INFOCOM
2006
IEEE
14 years 1 months ago
To Peer or Not to Peer: Modeling the Evolution of the Internet's AS-Level Topology
— Internet connectivity at the AS level, defined in terms of pairwise logical peering relationships, is constantly evolving. This evolution is largely a response to economic, po...
Hyunseok Chang, Sugih Jamin, Walter Willinger
MOBICOM
1996
ACM
14 years 4 hour ago
Reducing Processor Power Consumption by Improving Processor Time Management in a Single-user Operating System
The CPU is one of the major power consumers in a portable computer, and considerable power can be saved by turning off the CPU when it is not doing useful work. In Apple's Ma...
Jacob R. Lorch, Alan Jay Smith
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 8 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar