Sciweavers

115 search results - page 12 / 23
» On Information Flow Forensics in Business Application Scenar...
Sort
View
HICSS
1999
IEEE
78views Biometrics» more  HICSS 1999»
14 years 7 days ago
A Structured Transformation Approach for Legacy Information Systems - A Cash Receipts/Reimbursements Example
Legacy information systems are difficult to transform into the new or upgraded information systems. Part of the reason is being the incompatibility and the unscalability between t...
Jia-Lang Seng, Wayne Tsai
CAISE
2006
Springer
13 years 11 months ago
Integration of heterogeneous BPM Schemas: The Case of XPDL and BPEL
Heterogeneous Business Process Modeling (BPM) schemas have been a problem for business process management throughout the last couple of years. Although there are several standardiz...
Thomas Hornung, Agnes Koschmider, Jan Mendling
DOCENG
2008
ACM
13 years 9 months ago
Interactive office documents: a new face for web 2.0 applications
As the world wide web transforms from a vehicle of information dissemination and e-commerce transactions into a writable nexus of human collaboration, the Web 2.0 technologies at ...
John M. Boyer
LISA
2004
13 years 9 months ago
Meta Change Queue: Tracking Changes to People, Places, and Things
Managing information flow between different parts of the enterprise information infrastructure can be a daunting task. We have grown too large to send the complete lists around an...
Jon Finke
EUROMICRO
2004
IEEE
13 years 11 months ago
Towards an Event-Driven Workplace for Knowledge Integration
A contemporary office or knowledge worker has to deal with an ever increasing number of information channels and associated flows of events (i.e., software applications using vary...
Alexander Schatten, Stefan Biffl