Sciweavers

880 search results - page 129 / 176
» A Meta-Model for Enterprise Applications
Sort
View
96
Voted
PDPTA
2003
15 years 1 months ago
Dependability Prediction of High Availability OSCAR Cluster Server
High availability (HA) computing has recently gained much attention, especially in enterprise and mission critical systems. The HA is now a necessity that is no longer regarded as...
Chokchai Leangsuksun, Lixin Shen, Tong Liu, Herton...
DASFAA
2007
IEEE
162views Database» more  DASFAA 2007»
15 years 21 days ago
Framework for Extending RFID Events with Business Rule
Radio frequency identification (RFID) technology is believed to be the next revolutionary step in supply-chain management. Complex process simplification using RFID technology can ...
Mikyeong Moon, Seongjin Kim, Keunhyuk Yeom, Heeseo...
99
Voted
IJFCS
2006
111views more  IJFCS 2006»
15 years 15 days ago
Completeness and realizability: conditions for automatic generation of workflows
In recent years, workflow technology has greatly facilitated business process modeling and reengineering in information systems. On one hand, the separation of an application'...
Shiyong Lu, Arthur J. Bernstein, Philip M. Lewis
JCP
2006
106views more  JCP 2006»
15 years 15 days ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
ER
2010
Springer
249views Database» more  ER 2010»
14 years 11 months ago
On Enabling Data-Aware Compliance Checking of Business Process Models
In the light of an increasing demand on business process compliance, the verication of process models against compliance rules has become essential in enterprise computing. To be ...
David Knuplesch, Linh Thao Ly, Stefanie Rinderle-M...