Sciweavers

1538 search results - page 280 / 308
» Business Process Modeling Notation
Sort
View
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
15 years 4 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock
DOCENG
2008
ACM
15 years 2 months ago
Interactive office documents: a new face for web 2.0 applications
As the world wide web transforms from a vehicle of information dissemination and e-commerce transactions into a writable nexus of human collaboration, the Web 2.0 technologies at ...
John M. Boyer
103
Voted
ECIS
2004
15 years 1 months ago
Change management: the contribution of personal construct theory (PCT)
This paper explores the use of two complementary approaches, each stemming from Personal Construct Theory (PCT), to investigate the interdependence of organizations and informatio...
Laurence Brooks, Christopher J. Davis, Mark Lycett
95
Voted
ECIS
2004
15 years 1 months ago
Decoupling Application Roles and Technology Generations: A Life-Cycle Approach
Companies invest large amounts of money in new technologies. Not surprisingly, much of the research carried out in relation to IT-investments has focused on the adoption of new te...
Anders Mårtensson, Pablo Valiente
CAISE
2010
Springer
15 years 20 days ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...