Sciweavers

496 search results - page 21 / 100
» Where's the (Business) Beef
Sort
View
SACMAT
2003
ACM
14 years 3 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
ICMB
2007
IEEE
157views Business» more  ICMB 2007»
14 years 4 months ago
Estimating the Capacity of the Location - Based Advertising Channel
Delivering “relevant” advertisements to consumers carrying mobile devices is regarded by many as one of the most promising mobile business opportunities. The relevance of a mo...
Gyözö Gidófalvi, Hans Ravnkj&aeli...
ICEIS
2008
IEEE
14 years 4 months ago
Service Engineering for the Internet of Services
Abstract. The Internet and the Web have extended traditional business networks by allowing a Web of different digital resources to work together to create value for organizations. ...
Jorge Cardoso, Konrad Voigt, Matthias Winkler
GCC
2009
Springer
13 years 8 months ago
Interfaces for Placement, Migration, and Monitoring of Virtual Machines in Federated Clouds
Current cloud computing infrastructure offerings are lacking in interoperability, which is a hindrance to the advancement and adoption of the cloud computing paradigm. As clouds ar...
Erik Elmroth, Lars Larsson
ICWS
2009
IEEE
13 years 8 months ago
A Flexible Approach for Automatic Process Decentralization Using Dependency Tables
Web service paradigm and related technologies have provided favorable means for the realization of collaborative business processes. From both conceptual and implementation points...
Walid Fdhila, Ustun Yildiz, Claude Godart