Sciweavers

1608 search results - page 69 / 322
» Challenges in Business Process Analysis
Sort
View
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
14 years 3 months ago
No More Shadow Boxing with Online Music Piracy: Strategic Business Models to Enhance Revenues
Novel online file sharing technologies have created new market dynamics and posed a great challenge to the music industry to try and retain customers. Consumers have created anony...
Sudip Bhattacharjee, Ram D. Gopal, Kaveepan Lertwa...
BPM
2007
Springer
152views Business» more  BPM 2007»
13 years 12 months ago
Behavioral Constraints for Services
Recently, we introduced the concept of an operating guideline of a service as a structure that characterizes all its properly interacting partner services. The hitherto considered ...
Niels Lohmann, Peter Massuthe, Karsten Wolf
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 7 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
SIGSOFT
2006
ACM
14 years 11 months ago
Local analysis of atomicity sphere for B2B collaboration
Atomicity is a desirable property for business processes to conduct transactions in Business-to-Business (B2B) collaboration. Although it is possible to reason about atomicity of ...
Chunyang Ye, S. C. Cheung, W. K. Chan, Chang Xu
WETICE
2006
IEEE
14 years 4 months ago
On Representing Instance Changes in Adaptive Process Management Systems
By separating the process logic from the application code process management systems (PMS) offer promising perspectives for automation and management of business processes. Howeve...
Stefanie Rinderle, Ulrich Kreher, Markus Lauer, Pe...