Sciweavers

173 search results - page 24 / 35
» Modelling Quality of Protection in Outsourced Business Proce...
Sort
View
IADIS
2004
13 years 10 months ago
Mastering the mystery through 'SAIQ' metrics of user experience in telecollaboration business systems
In the preparation of technology transition, the contextual and alternative definitions of the usability heuristics of multifaceted role of the best practice methodology of Teleco...
Venkatesh Mahadevan, Zenon Chaczko, Robin Braun
BPM
2009
Springer
258views Business» more  BPM 2009»
14 years 3 months ago
Activity Mining by Global Trace Segmentation
Process Mining is a technology for extracting non-trivial and useful information from execution logs. For example, there are many process mining techniques to automatically discove...
Christian W. Günther, Anne Rozinat, Wil M. P....
ESORICS
2007
Springer
14 years 2 months ago
Change-Impact Analysis of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall directly...
Alex X. Liu
SEW
2006
IEEE
14 years 2 months ago
Goal-Driven Software Development
Established software development processes focus on delivering software within time and budget according to a set of requirements. However, practical experiences show that neither...
Ingo Schnabel, Markus Pizka
ECIS
2001
13 years 9 months ago
Re orienting information systems for customer centric service: The case of the Greek Ministry of Finance
Governments are employing modern information and communication technologies to better serve society. Raising the effectiveness of government as well as the quality of the civil se...
Dimitrios S. Stamoulis, Dimitris Gouscos, Panagiot...