Sciweavers

662 search results - page 59 / 133
» Behavior Based Integration of Composite Business Processes
Sort
View
IEEESCC
2005
IEEE
15 years 3 months ago
Web Services Composition: A Story of Models, Automata, and Logics
eal world”, represented abstractly using (time-varying) first-order logic predicates and terms. A representative composition result [11] here uses a translation into Petri nets. ...
Richard Hull
ICDCS
1996
IEEE
15 years 2 months ago
Group Routing without Group Routing Tables
We present a group routing protocol for a network of processes. The task of the protocol is to route data messages to each member of a process group. To this end, a tree of proces...
Jorge Arturo Cobb, Mohamed G. Gouda
SACMAT
2003
ACM
15 years 3 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
WER
2004
Springer
15 years 3 months ago
Integrating Natural Language Oriented Requirements Models into MDA
MDA is a software development framework where the core is a set of automatic transformation of models. One of these models, the CIM, is used to define the business process model. T...
Maria Carmen Leonardi, María Virginia Mauco
ICECCS
2009
IEEE
161views Hardware» more  ICECCS 2009»
15 years 4 months ago
Formal Modelling and Analysis of Business Information Applications with Fault Tolerant Middleware
Distributed information systems are critical to the functioning of many businesses; designing them to be dependable is a challenging but important task. We report our experience i...
Jeremy Bryans, John S. Fitzgerald, Alexander Roman...