Sciweavers

915 search results - page 98 / 183
» Security in Business Process Engineering
Sort
View
VAMOS
2008
Springer
13 years 10 months ago
Value-Based Elicitation of Product Line Variability: An Experience Report
Understanding and modeling the variability of an existing system is a highly critical and challenging task when adopting a product line approach. Only little guidance is available...
Rick Rabiser, Deepak Dhungana, Paul Grünbache...
ESEC
1999
Springer
14 years 1 months ago
FACADE: A Typed Intermediate Language Dedicated to Smart Cards
The use of smart cards to run software modules on demand has become a major business concern for application issuers. Such downloadable executable content requires to be trusted by...
Gilles Grimaud, Jean-Louis Lanet, Jean-Jacques Van...
EDBT
2006
ACM
202views Database» more  EDBT 2006»
14 years 9 months ago
Bridging Physical and Virtual Worlds: Complex Event Processing for RFID Data Streams
Advances of sensor and RFID technology provide significant new power for humans to sense, understand and manage the world. RFID provides fast data collection with precise identific...
Fusheng Wang, Shaorong Liu, Peiya Liu, Yijian Bai
AC
2004
Springer
13 years 8 months ago
The Timeboxing process model for iterative software development
In today's business where speed is of essence, an iterative development approach that allows the functionality to be delivered in parts has become a necessity and an effectiv...
Pankaj Jalote, Aveejeet Palit, Priya Kurien
COMPSAC
2009
IEEE
14 years 1 months ago
Middleware for RFID Systems: An Overview
RFID-Based Systems have started to play a significant role in the automation of many business processes such as ERP systems and object tracking. Several efforts were made within t...
Jameela Al-Jaroodi, Junaid Aziz, Nader Mohamed