The correctness of business process models is of paramount importance for the application on an enterprise level. A severe problem is that several languages for business process m...
Boudewijn F. van Dongen, Jan Mendling, Wil M. P. v...
This study focused on improving vigilance performance through developing methods to arouse subjects to the possibility of errors in a data manipulation information warfare attack....
In this paper, we examine the relationship between users’ technology readiness (specifically employees) and their adoption of wireless technology and services in a longitudinal ...
We assessed the feasibility of “bridging the digital divide” by training community health advisors (CHAs) from low-income communities to use high-quality Internet-based health...
Thomas K. Houston, Kimberly Robinson, Eta Berner, ...
The increasing availability of web services necessitates efficient discovery and execution framework. The use of xml at various levels of web services standards poses challenges t...
Naveen Srinivasan, Massimo Paolucci, Katia P. Syca...