Sciweavers

2653 search results - page 361 / 531
» Business process reengineering
Sort
View
INFOCOM
1997
IEEE
14 years 14 days ago
Time Scale Analysis of an ATM Queueing System with Long-Range Dependent Traffic
Several types of network trafic have been shown to exhibit long-range dependence (LRD). In this work, we show that the busy period of an ATM system driven by a long-range dependen...
Gilberto Mayor, John A. Silvester
CAISE
2007
Springer
14 years 8 days ago
Formalization and Verification of EPCs with OR-Joins Based on State and Context
The semantics of the OR-join in business process modeling languages like EPCs or YAWL have been discussed for a while. Still, the existing solutions suffer from at least one of two...
Jan Mendling, Wil M. P. van der Aalst
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
13 years 11 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
APN
2008
Springer
13 years 10 months ago
Synthesis of Petri Nets from Scenarios with VipTool
The aim of this tool paper is twofold: First we show that VipTool [9, 2] can now synthesize Petri nets from partially ordered runs. To integrate this extension and further new func...
Robin Bergenthum, Jörg Desel, Robert Lorenz, ...
MKWI
2008
137views Business» more  MKWI 2008»
13 years 9 months ago
Improving information security compliance - A process-oriented approach for managing organizational change
Abstract: Enterprises typically have to comply with many different legal, regulatory and internal requirements. Particularly in the context of information processing, there are ded...
Roland Gabriel, Sebastian Sowa, Jochen Wiedemann