Sciweavers

1532 search results - page 271 / 307
» Sequence Constraints in Business Modelling and Business Proc...
Sort
View
GLOBECOM
2009
IEEE
13 years 11 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
DIAGRAMS
2010
Springer
13 years 9 months ago
Diagram Editing on Interactive Displays Using Multi-touch and Pen Gestures
Creating and editing graphs and node-link diagrams by means of digital tools are crucial activities in domains such as software or business process modeling. However, these tools h...
Mathias Frisch, Jens Heydekorn, Raimund Dachselt
ECIS
2004
13 years 9 months ago
From asp to web services: identifying key performance areas and indicators for healthcare
Value creation from e-business for customers in healthcare is an important topic in academic and practitioner circles. This paper reports the findings from a two-year research stu...
Matthew W. Guah, Wendy L. Currie
ECIS
2004
13 years 9 months ago
The Medium Matters: The Effects Of Media Attributes And Evidence Strength On Belief Revision
Face-to-face meetings between auditors and their clients are increasingly difficult to arrange, due to business globalization and the growing need for rapid audit decision-making....
Anna H. Nöteberg
ECIS
2000
13 years 9 months ago
Perspectives on Knowledge Management Systems - Theoretical Framework and Design of an Empirical Study
Abstract- This paper deals with "Knowledge Management Systems" (KMS) which are seen as a new kind of information systems supporting organizational information processing....
Ronald Maier, Franz Lehner