This work presents a method for the definition of process capability profiles lined up with the specific business model of small software companies. The developed method is made u...
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
When trying to describe the behaviour of large systems, such as the business processes of large enterprises, we often adopt diagramming techniques based on derivatives of data flo...
This paper addresses the question to what extent a process involving multiple agents that shows some form of collective intelligence can be interpreted as a single agent. The quest...
A software application has strong relationships with the business processes it supports. In the analysis phase those parts of the processes in which the software system is applied...