Sciweavers

20833 search results - page 308 / 4167
» Hidden process models
Sort
View
IFIP
2009
Springer
15 years 2 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
ISPW
2009
IEEE
15 years 11 months ago
A Pattern for Modeling Rework in Software Development Processes
It is usual for work completed at one point in a software development process to be revisited, or reworked, at a later point. Such rework is informally understood, but if we hope t...
Aaron G. Cass, Leon J. Osterweil, Alexander E. Wis...
ICDE
1987
IEEE
143views Database» more  ICDE 1987»
15 years 8 months ago
A Query Processing Strategy for the Decomposed Storage Model
Handling parallelism in database systems involves the specification of a storage model, a placement strategy, and a query processing strategy. An important goal is to determine th...
Setrag Khoshafian, George P. Copeland, Thomas Jago...
BIS
2008
92views Business» more  BIS 2008»
15 years 6 months ago
Structural Detection of Deadlocks in Business Process Models
Abstract. A common task in business process modelling is the verification of process models regarding syntactical and structural errors. While the former might be checked with low ...
Ahmed Awad, Frank Puhlmann
ML
2008
ACM
15 years 4 months ago
Inductive process modeling
In this paper, we pose a novel research problem for machine learning that involves constructing a process model from continuous data. We claim that casting learned knowledge in ter...
Will Bridewell, Pat Langley, Ljupco Todorovski, Sa...