Sciweavers

240 search results - page 16 / 48
» Privacy and Utility in Business Processes
Sort
View
CHI
2009
ACM
14 years 5 months ago
'Broken Expectations' from a global business perspective
Especially in the past few years, there has been an increase in the rejection rate of interactive consumer electronics products in the field, not due to broken hardware or softwar...
Aylin Koca, Evangelos Karapanos, Aarnout Brombache...
IEAAIE
1999
Springer
14 years 3 months ago
Using Cases for Process Modelling: An Example from the Water Supply Industry
This paper describes the use of cases as a process representation technique and shows how case base reasoning can be used to navigate through, or execute a complex control process....
Guy Saward
ICCS
2005
Springer
14 years 4 months ago
Hierarchical Infrastructure for Large-Scale Distributed Privacy-Preserving Data Mining
Abstract. Data Mining is often required to be performed among a number of groups of sites, where the precondition is that no privacy of any site should be leaked out to other sites...
Jinlong Wang, Congfu Xu, Huifeng Shen, Yunhe Pan
ICWS
2009
IEEE
13 years 8 months ago
A Flexible Approach for Automatic Process Decentralization Using Dependency Tables
Web service paradigm and related technologies have provided favorable means for the realization of collaborative business processes. From both conceptual and implementation points...
Walid Fdhila, Ustun Yildiz, Claude Godart
ECIS
2003
14 years 8 days ago
The value of business intelligence in the context of developing countries
In the corporate context, a combination of constant technological innovation and increasing competitiveness makes the management of information a huge challenge and requires decis...
Maira Petrini, Marlei Pozzebon