Sciweavers

375 search results - page 50 / 75
» ADEPT: An Agent-Based Approach to Business Process Managemen...
Sort
View
WSE
2002
IEEE
14 years 1 months ago
Migrating to the Web a Legacy Application: The Sinfor Project
Various approaches can be used to migrate legacy applications to the Web. In particular, migrating dataintensive legacy applications (e.g. traditional application for business man...
Damiano Distante, Vito Perrone, Mario A. Bochicchi...
JUCS
2010
134views more  JUCS 2010»
13 years 7 months ago
Leveraging ICT Deployment and Integration in a Public Organization Aged 176 Years A Greek Case Study
: The successful deployment and exploitation of an Information and Communications Technologies (ICT) project in a traditional Public Organization involves the proper design and imp...
Melpomeni Hatzikou, Iraklis-Panagiotis Agiovlasiti...
MODELS
2010
Springer
13 years 7 months ago
Transforming Process Models: Executable Rewrite Rules versus a Formalized Java Program
Abstract. In the business process management community, transformations for process models are usually programmed using imperative languages (such as Java). The underlying mapping ...
Pieter Van Gorp, Rik Eshuis
BDIM
2007
IEEE
115views Business» more  BDIM 2007»
13 years 8 months ago
Specifying Information Security Needs for the Delivery of High Quality Security Services
In this paper we present an approach for specifying respect to security. When an organization wants to secure and prioritizing information security requirements in organiza- its sy...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
SAC
2004
ACM
14 years 2 months ago
A mobile agent approach for global database constraint checking
Integrity constraints are valuable tools for enforcing consistency of data in a database. Global integrity constraints ensure integrity and consistency of data spanning multiple d...
Praveen Madiraju, Rajshekhar Sunderraman