In recent literature it is commonly agreed that the first phase of the software development process is still an area of concern. Furthermore, while software technology has been ch...
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
In designing and developing large complex products, people use models to describe and organize interrelated elements in both product systems (architecture, use cases, constraints....
Xiao Jing, Pierre Pinel, Lei Pi, Vincent Aranega, ...
With the advent of the Web, search has become the prominent paradigm for information seeking, not only across the online space but also within enterprises. Search engine functiona...
Alessandro Bozzon, Marco Brambilla, Piero Fraterna...
This paper describes a prototype for supporting distributed, mobile software processes. The prototype allows instantiated process models to be distributed in different workspaces, ...