Sciweavers

915 search results - page 59 / 183
» Security in Business Process Engineering
Sort
View
ISSA
2004
13 years 10 months ago
A General Methodology For The Development Of An Effective Information Security Policy
In today's hi-tech world, conventional physical security methods are simply insufficient for the protection of an organisation's information assets. This is because of t...
Arvish Ramdeyal
AINA
2008
IEEE
14 years 3 months ago
WS-BPEL Process Compiler for Resource-Constrained Embedded Systems
Process management and workflow systems play an important role in the composition of services in business as well as automation environments. Processes are designed using tools a...
Hendrik Bohn, Andreas Bobek, Frank Golatowski
ICDE
2005
IEEE
107views Database» more  ICDE 2005»
14 years 2 months ago
Search Experiment of Business-Rule by Dynamic Constraint Algebra
Abstract Although e-commerce is becoming popular, product rules, which describe various conditions such as prices, applicability, and discount conditions are still expressed in nat...
Rui Kimura, Takayuki Shiga, Mizuho Iwaihara
ESWA
2011
220views Database» more  ESWA 2011»
13 years 14 days ago
Unsupervised neural models for country and political risk analysis
This interdisciplinary research project focuses on relevant applications of Knowledge Discovery and Artificial Neural Networks in order to identify and analyse levels of country, b...
Álvaro Herrero, Emilio Corchado, Alfredo Ji...
HICSS
2005
IEEE
156views Biometrics» more  HICSS 2005»
14 years 2 months ago
Insights in Implementing Collaboration Engineering
Collaboration Engineering is an emerging discipline to design and deploy collaboration processes and technologies for repeatable tasks performed by groups. This paper documents th...
Robert J. Harder, Jean M. Keeter, Bryan W. Woodcoc...