Sciweavers

1700 search results - page 48 / 340
» Introducing Business Process into Legacy Information Systems
Sort
View
IFIP8
2007
14 years 11 months ago
A Hybrid Approach for Business Process Verification
Business Process Verification (BPV) is increasingly important in emerging BPM Systems. Although many approaches related to BPV exist, the gap between formal models defined in previ...
Bing Li, Junichi Iijima
COOPIS
2002
IEEE
15 years 2 months ago
Finding Trading Partners to Establish Ad-hoc Business Processes
Enabling technology for realizing ad-hoc business processes currently is becoming more and more popular, like for example web services. Ad-hoc business processes are semantically c...
Andreas Wombacher, Bendick Mahleko
CIDM
2009
IEEE
15 years 4 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
APSCC
2008
IEEE
15 years 4 months ago
Minimized Domain Knowledge for SOA-Based Interoperability
The variety and heterogeneity of legacy systems at the application level have contributed to the complexity of interoperability provision among different application domains. In t...
Azin Dehmoobad, Kamran Sartipi
CAISE
2009
Springer
15 years 4 months ago
The Declarative Approach to Business Process Execution: An Empirical Test
Declarative approaches have been proposed to counter the limited flexibility of the traditional imperative modeling paradigm, but little empirical insights are available into thei...
Barbara Weber, Hajo A. Reijers, Stefan Zugal, Wern...