Sciweavers

61 search results - page 7 / 13
» A Bottom-Up Workflow Mining Approach for Workflow Applicatio...
Sort
View
IFIP
2009
Springer
13 years 6 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
HCI
2007
13 years 10 months ago
Interfacing Safety and Communication Breakdowns: Situated Medical Technology Design
Safety-critical medical work requires an error-minded approach for design of the technologies that support its processes. We define the requirements that such a framework should me...
Svetlena Taneva, Effie Law
ASUNAM
2009
IEEE
13 years 6 months ago
Social Network Analysis as Knowledge Discovery Process: A Case Study on Digital Bibliography
Abstract--Today Digital Bibliographies are a powerful instrument that collects a great amount of data about scientific publications. Digital Bibliographies have been used as basis ...
Michele Coscia, Fosca Giannotti, Ruggero G. Pensa
BMCBI
2004
131views more  BMCBI 2004»
13 years 8 months ago
A web services choreography scenario for interoperating bioinformatics applications
Background: Very often genome-wide data analysis requires the interoperation of multiple databases and analytic tools. A large number of genome databases and bioinformatics applic...
Remko de Knikker, Youjun Guo, Jin-long Li, Albert ...
SOCA
2008
IEEE
13 years 8 months ago
Log-based mining techniques applied to Web service composition reengineering
There is no doubt that SOA and BPM will continue to evolve dependently for the next ten years. Preparing common research infrastructures will require most important efforts of web ...
Walid Gaaloul, Karim Baïna, Claude Godart