Sciweavers

232 search results - page 32 / 47
» hicss 2008
Sort
View
HICSS
2008
IEEE
110views Biometrics» more  HICSS 2008»
14 years 3 months ago
Gathering Experience Knowledge from Iterative Software Development Processes
This paper proposes that experience knowledge would be beneficial for iterative software development. In this paper, experience knowledgebased artifacts have been linked to Extrem...
Jouni Kokkoniemi
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
14 years 3 months ago
Geographically Distributed Enterprise Architecting: Towards a Theoretical Framework
Enterprise architecting is becoming critical for most modern organizations whose competitive strategies are tightly linked to the underlying information technology (IT) infrastruc...
J. Alberto Espinosa, Frank Armour
HICSS
2008
IEEE
187views Biometrics» more  HICSS 2008»
14 years 3 months ago
Relational Risk Mitigation: The Relationship Approach to Mitigating Risks in Business Process Outsourcing
Managing risks in outsourcing has been widely researched but is still not fully understood by either academics or practitioners. Recent research on IS outsourcing relationships ha...
Kim Wüllenweber, Stefanie Jahner, Helmut Krcm...
HICSS
2008
IEEE
147views Biometrics» more  HICSS 2008»
14 years 3 months ago
Toward a Ubiquitous Personalized Daily-Life Activity Recommendation Service with Contextual Information: A Services Science Pers
In recent years Services Science has been an emerging discipline that aims to promote service innovation and increase service productivity by aligning scientific, management, and ...
Chen-Ya Wang, Yueh-Hsun Wu, Seng-cho Timothy Chou
HICSS
2008
IEEE
107views Biometrics» more  HICSS 2008»
14 years 3 months ago
Research on Constraints in Anti-Money Laundering (AML) Business Process in China Based on Theory of Constraints
Anti-money laundering is a pressing issue in today’s economy. With the newly launched Chinese anti-money laundering regulation, this issue has drawn more and more attention from...
Xuan Liu, Pengzhu Zhang