: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
In order to support continuous queries over data streams, a plethora of suitable techniques as well as prototypes have been developed and evaluated in recent years. In particular,...
: We present a business process performance evaluation approach based on a hierarchy of interacting analytical performance models from semanticoriented key performance indicator mo...
Abstract. Reference process models capture recurrent business operations in a given domain such as procurement or logistics. These models are intended to be configured to fit the r...
Wil M. P. van der Aalst, Marlon Dumas, Florian Got...
Business processes play a central role in the reorganization of a company and the (re)design of the respective information system(s). Typically the processes are described with the...