Sciweavers

50 search results - page 9 / 10
» Norm Compliance in Business Process Modeling
Sort
View
HICSS
1999
IEEE
183views Biometrics» more  HICSS 1999»
14 years 3 months ago
Extending the Technology Acceptance Model to Account for Social Influence: Theoretical Bases and Empirical Validation
The Technology Acceptance Model (TAM) represents an important theoretical contribution toward understanding IS usage and IS acceptance behaviors [6, 19]. However, as noted by seve...
Yogesh Malhotra, Dennis F. Galletta
ICDM
2010
IEEE
96views Data Mining» more  ICDM 2010»
13 years 8 months ago
Domain-Driven Data Mining for IT Infrastructure Support
Abstract--Support analytics (i.e., statistical analysis, modeling and mining of customer/operations support tickets data) is important in service industries. In this paper, we adop...
Girish Keshav Palshikar, Harrick M. Vin, Mohammed ...
DEXAW
1997
IEEE
99views Database» more  DEXAW 1997»
14 years 3 months ago
A Framework for Dynamic Changes in Workflow Management Systems
Current workflow management systems (WFMSs) are only applicable in a reliable and secure manner, if the business process (BP) to be supported is wellstructured. As ad hoc deviatio...
Manfred Reichert, Peter Dadam
CAISE
2010
Springer
13 years 11 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
EON
2008
14 years 6 days ago
Abductive Synthesis of the Mediator Scenario with jABC and GEM
We reuse here the framework, the setting, and the semantic modelling for the automated synthesis of the SWS Challenge Mediator presented in the companion paper [5], and show how to...
Christian Kubczak, Tiziana Margaria, Matthias Kais...