Sciweavers

376 search results - page 39 / 76
» Collaborative modeling of business processes: a comparative ...
Sort
View
CISIS
2009
IEEE
15 years 2 months ago
Creation and Delivery of Complex Learning Experiences: The ELeGI Approach
The paper presents the main findings of the ELeGI project, namely its learning model and software architecture to support the creation and execution of complex learning processes....
Nicola Capuano, Angelo Gaeta, Agostino Marengo, Se...
LEGE
2003
174views Education» more  LEGE 2003»
14 years 11 months ago
An e-Learning platform for SME Manager Upgrade and its Evolution Toward a Distributed Training Environment
The purpose of this paper is to describe the work in progress related to the customisation, the trial and the evaluation of an innovative e-learning platform for manager upgrade i...
Nicola Capuano, Matteo Gaeta, Laura Pappacena
ICWS
2008
IEEE
14 years 11 months ago
A Framework for Verifying SLA Compliance in Composed Services
Service level agreements (SLAs) impose many nonfunctional requirements on services. Business analysts specify and check these requirements in business process models using tools s...
Hua Xiao, Brian Chan, Ying Zou, Jay W. Benayon, Bi...
CISIS
2009
IEEE
15 years 4 months ago
Strengths and Weaknesses of Maturity Driven Process Improvement Effort
In the recent decades most of the big organizations have adopted maturity driven process improvement efforts (MDPI). Most of these efforts have been inspired of maturity models li...
Asadullah Shaikh, Ashfaq Ahmed, Nasrullah Memon, M...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 4 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard