Business processes used in networked business are often large and complex, which makes them difficult to manage and change. In this paper we address this lack of flexibility by pr...
Tim van Eijndhoven, Maria-Eugenia Iacob, Mar&iacut...
This paper presents an approach for translating legalese expression of business contracts into candidate business activities and processes while ensuring their compliance with con...
Zoran Milosevic, Shazia Wasim Sadiq, Maria E. Orlo...
Most recovery schemes that have been proposed for Distributed Shared Memory (DSM) systems require unnecessarily high checkpointing frequency and checkpoint traffic, which are sens...
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
Increasingly, organizations have been investing heavily in information systems for greater dyadic coordination and cooperation with each of their key business partners. In this re...