Sciweavers

1534 search results - page 71 / 307
» A Business Process Explorer: Recovering Business Processes f...
Sort
View
BPM
2003
Springer
102views Business» more  BPM 2003»
14 years 2 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory
IJFCS
2006
111views more  IJFCS 2006»
13 years 8 months ago
Completeness and realizability: conditions for automatic generation of workflows
In recent years, workflow technology has greatly facilitated business process modeling and reengineering in information systems. On one hand, the separation of an application'...
Shiyong Lu, Arthur J. Bernstein, Philip M. Lewis
DEEC
2006
IEEE
14 years 13 days ago
A Bottom-Up Workflow Mining Approach for Workflow Applications Analysis
Abstract. Engineering workflow applications are becoming more and more complex, involving numerous interacting business objects within considerable processes. Analysing the interac...
Walid Gaaloul, Karim Baïna, Claude Godart
DOLAP
2004
ACM
14 years 2 months ago
Developing a characterization of business intelligence workloads for sizing new database systems
Computer system sizing involves estimating the amount of hardware resources needed to support a new workload not yet deployed in a production environment. In order to determine th...
Ted J. Wasserman, Patrick Martin, David B. Skillic...
DGO
2004
118views Education» more  DGO 2004»
13 years 10 months ago
Human-Centered Systems for Business Services
The focus of this paper reports a collaborative effort with the State of New Jersey in designing and building a human-centered e-government portal to support small and medium size...
Nabil R. Adam, Vijayalakshmi Atluri, Soon Ae Chun