Sciweavers

104 search results - page 18 / 21
» Towards Formal Analysis of Artifact-Centric Business Process...
Sort
View
94
Voted
PE
2010
Springer
133views Optimization» more  PE 2010»
14 years 8 months ago
Positive Harris recurrence and diffusion scale analysis of a push pull queueing network
We consider a push pull queueing system with two servers and two types of jobs which are processed by the two servers in opposite order, with stochastic generally distributed proc...
Yoni Nazarathy, Gideon Weiss
78
Voted
CAISE
2007
Springer
15 years 4 months ago
Conceptual Modeling of Privacy-Aware Web Service Protocols
Abstract. Internet users are becoming increasingly concerned about their personal information being collected and used by Web service providers. They want to ensure that it is stor...
Rachid Hamadi, Hye-Young Paik, Boualem Benatallah
69
Voted
HICSS
2002
IEEE
87views Biometrics» more  HICSS 2002»
15 years 3 months ago
Using Enterprise Reference Models for Automated ISO 9000 Compliance Evaluation
A computational enterprise model representing key facets of an organization can be an effective tool. For example, a specific organization's quality management business proce...
Henry M. Kim, Mark S. Fox
HICSS
2003
IEEE
159views Biometrics» more  HICSS 2003»
15 years 3 months ago
Building a Knowledge Sharing Company - Evidence From the Finnish Insurance Industry
This paper crystallises out some key findings of knowledge management practices from a Finnish survey on the insurance industry. 15 Finnish insurance companies of different sizes ...
Gunilla Widén-Wulff, Reima Suomi
79
Voted
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
15 years 2 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock