Sciweavers

249 search results - page 33 / 50
» Modelling Security Goals in Business Processes
Sort
View
GECON
2007
Springer
126views Business» more  GECON 2007»
14 years 1 months ago
GridEcon - The Economic-Enhanced Next-Generation Internet
The major shortcoming of Grid middleware systems is the lack of economic-enhanced Grid services. These new services are necessary in order to let Grid users benefit from the proper...
Jörn Altmann, Costas Courcoubetis, John Darli...
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 7 months ago
RFID Applications: An Introductory and Exploratory Study
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use R...
Kamran Ahsan, Hanifa Shah, Paul Kingston
EMISA
2010
Springer
13 years 5 months ago
Supporting ad hoc Analyses on Enterprise Models
Abstract: Enterprises are socio technical systems whose management involves multiple stakeholders each demanding for a distinct perspective on the enterprise. A large number of mod...
Sabine Buckl, Jens Gulden, Christian M. Schweda
CASCON
2006
136views Education» more  CASCON 2006»
13 years 9 months ago
Workload adaptation in autonomic DBMSs
Workload adaptation is a performance management process in which an autonomic database management system (DBMS) efficiently makes use of its resources by filtering or controlling ...
Baoning Niu, Patrick Martin, Wendy Powley, Randy H...
JUCS
2008
341views more  JUCS 2008»
13 years 7 months ago
IQM3: Information Quality Management Maturity Model
: In order to enhance their global business performance, organizations must be careful with the quality of their information since it is one of their main assets. Analogies to qual...
Ismael Caballero, Angelica Caro, Coral Calero, Mar...