Sciweavers

4326 search results - page 221 / 866
» A Model for Process Service Interaction
Sort
View
124
Voted
LISA
2007
15 years 6 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
103
Voted
ECIS
2003
15 years 5 months ago
E-negotiations: towards engineering of technology-based social processes
Traditionally, negotiation support was based on normative and prescriptive research; its users were analysts and experts. The purpose of the recently developed e-negotiation syste...
Gregory E. Kersten
CONCUR
2009
Springer
15 years 10 months ago
Encoding Asynchronous Interactions Using Open Petri Nets
Abstract. We present an encoding for (bound) processes of the asynchronous CCS with replication into open Petri nets: ordinary Petri nets equipped with a distinguished set of open ...
Paolo Baldan, Filippo Bonchi, Fabio Gadducci
BPM
2009
Springer
169views Business» more  BPM 2009»
15 years 10 months ago
Analyzing Resource Behavior Using Process Mining
It is vital to use accurate models for the analysis, design, and/or control of business processes. Unfortunately, there are often important discrepancies between reality and models...
Joyce Nakatumba, Wil M. P. van der Aalst
146
Voted
AROBOTS
2004
114views more  AROBOTS 2004»
15 years 3 months ago
Integration of a Rehabilitation Robotic System (KARES II) with Human-Friendly Man-Machine Interaction Units
In this paper, we report some important results of design and evaluation of a wheelchair-based robotic arm system, named as KARES II (KAIST Rehabilitation Engineering Service Syste...
Zeungnam Bien, Myung Jin Chung, Pyung Hun Chang, D...