Sciweavers

378 search results - page 37 / 76
» Security requirement analysis of business processes
Sort
View
ICS
2010
Tsinghua U.
14 years 13 days ago
Small-ruleset regular expression matching on GPGPUs: quantitative performance analysis and optimization
We explore the intersection between an emerging class of architectures and a prominent workload: GPGPUs (General-Purpose Graphics Processing Units) and regular expression matching...
Jamin Naghmouchi, Daniele Paolo Scarpazza, Mladen ...
CORR
2008
Springer
96views Education» more  CORR 2008»
13 years 7 months ago
On the Superdistribution of Digital Goods
: Business models involving buyers of digital goods in the distribution process are called superdistribution schemes. We review the state-of-the art of research and application of ...
Andreas U. Schmidt
FASE
2009
Springer
14 years 2 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
ER
2008
Springer
117views Database» more  ER 2008»
13 years 9 months ago
On the Formal Semantics of Change Patterns in Process-Aware Information Systems
Due to a turbulent market enterprises should be able to adapt their business processes in a quick and flexible way. This requires adaptive process-aware information systems (PAISs)...
Stefanie Rinderle-Ma, Manfred Reichert, Barbara We...
ECIS
2000
13 years 9 months ago
Best of Breed IT Strategy: An Alternative to Enterprise Resource Planning Systems
- Enterprise Resource Planning (ERP) software has become the dominant strategic platform for supporting enterprise-wide business processes. However, single vendor ERP software syst...
Ben Light, Christopher P. Holland, Sue Kelly, Karl...