Sciweavers

173 search results - page 14 / 35
» Modelling Quality of Protection in Outsourced Business Proce...
Sort
View
SQJ
2008
116views more  SQJ 2008»
13 years 8 months ago
E-commerce system quality assessment using a model based on ISO 9126 and Belief Networks
: As business transitions into the new economy, e-system successful use has become a strategic goal. Especially in business to consumer (e-commerce) applications, users highly eval...
Antonia Stefani, Michalis Nik Xenos
PET
2005
Springer
14 years 1 months ago
Privacy in India: Attitudes and Awareness
Abstract. In recent years, numerous surveys have been conducted to assess attitudes about privacy in the United States, Australia, Canada, and the European Union. Very little infor...
Ponnurangam Kumaraguru, Lorrie Faith Cranor
JCST
2008
114views more  JCST 2008»
13 years 8 months ago
Synthesizing Service Composition Models on the Basis of Temporal Business Rules
Transformational approaches to generating design and implementation models from requirements can bring effectiveness and quality to software development. In this paper we present a...
Jian Yu, Yanbo Han, Jun Han, Yan Jin, Paolo Falcar...
HICSS
2009
IEEE
161views Biometrics» more  HICSS 2009»
14 years 10 days ago
Configurative Service Engineering - A Rule-Based Configuration Approach for Versatile Service Processes in Corrective Maintenanc
Recently, service orientation has increasingly been debated both in research and practice. While researchers postulate a paradigm shift towards services as the basic unit of excha...
Jörg Becker, Daniel Beverungen, Ralf Knackste...
KDD
2008
ACM
148views Data Mining» more  KDD 2008»
14 years 9 months ago
Get another label? improving data quality and data mining using multiple, noisy labelers
This paper addresses the repeated acquisition of labels for data items when the labeling is imperfect. We examine the improvement (or lack thereof) in data quality via repeated la...
Victor S. Sheng, Foster J. Provost, Panagiotis G. ...