Sciweavers

259 search results - page 32 / 52
» Workflow Exception Patterns
Sort
View
BPM
2008
Springer
134views Business» more  BPM 2008»
13 years 10 months ago
Digital Identity and Reputation in the Context of a Bounded Social Ecosystem
This paper highlights the problem of digital identity, or cross-set unique identifying tokens, inherent in the application of social software in business processes. As social softw...
Ben Jennings, Anthony Finkelstein
WWW
2005
ACM
14 years 9 months ago
The classroom sentinel: supporting data-driven decision-making in the classroom
Whereas schools typically record mounds of data regarding student performance, attendance, and other behaviors over the course of a school year, rarely is that data consulted and ...
Mark K. Singley, Richard B. Lam
APCCM
2006
13 years 10 months ago
Network data mining: methods and techniques for discovering deep linkage between attributes
Network Data Mining identifies emergent networks between myriads of individual data items and utilises special algorithms that aid visualisation of `emergent' patterns and tre...
John Galloway, Simeon J. Simoff
EUROIMSA
2006
116views Multimedia» more  EUROIMSA 2006»
13 years 10 months ago
Guidelines for Selecting Practical MPEG Group of Pictures
The repeated pattern of I, P and B frames in an MPEG stream is known as the Group of Pictures (GOP). Current GOP choices are made using intuition and informal guidelines without t...
Huahui Wu, Mark Claypool, Robert E. Kinicki
WWW
2005
ACM
14 years 9 months ago
On business activity modeling using grammars
Web based applications offer a mainstream channel for businesses to manage their activities. We model such business activity in a grammar-based framework. The Backus Naur form not...
Savitha Srinivasan, Arnon Amir, Prasad Deshpande, ...