Sciweavers

583 search results - page 69 / 117
» Innovation in Business Groups
Sort
View
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
13 years 11 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
BPM
2009
Springer
258views Business» more  BPM 2009»
14 years 2 months ago
Activity Mining by Global Trace Segmentation
Process Mining is a technology for extracting non-trivial and useful information from execution logs. For example, there are many process mining techniques to automatically discove...
Christian W. Günther, Anne Rozinat, Wil M. P....
VL
2008
IEEE
171views Visual Languages» more  VL 2008»
14 years 2 months ago
Usability challenges for enterprise service-oriented architecture APIs
An important part of many programming tasks is the use of libraries and other forms of Application Programming Interfaces (APIs). Programming via web services using a Service-Orie...
Jack Beaton, Sae Young Jeong, Yingyu Xie, Jeffrey ...
ICMB
2007
IEEE
124views Business» more  ICMB 2007»
14 years 2 months ago
Piercing the Fog of Mobile Advertising
Mobile advertising holds strong promises to become the most highly targeted advertising medium offering new ways to target messages to users. By utilizing mobile advertising, comp...
Ramin Vatanparast
ICWE
2004
Springer
14 years 1 months ago
MDA applied: From Sequence Diagrams to Web Service Choreography
Abstract. Web Services and Web Service composition languages for Web Service choreography are becoming more and more important in the area for inter-enterprise application and proc...
Bernhard Bauer, Jörg P. Müller