Sciweavers

44 search results - page 5 / 9
» Logging key assurance indicators in business processes
Sort
View
SACMAT
2009
ACM
14 years 2 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
BPM
2009
Springer
161views Business» more  BPM 2009»
14 years 4 months ago
Trace Clustering Based on Conserved Patterns: Towards Achieving Better Process Models
Process mining refers to the extraction of process models from event logs. Real-life processes tend to be less structured and more flexible. Traditional process mining algorithms ...
R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aa...
ICASSP
2009
IEEE
14 years 4 months ago
Quickest change detection in multiple on-off processes
A Bayesian formulation of quickest change detection in multiple onoff processes is obtained within a decision-theoretic framework. For geometrically distributed busy and idle time...
Qing Zhao, Jia Ye
HICSS
2002
IEEE
124views Biometrics» more  HICSS 2002»
14 years 2 months ago
Designing Information Technology Governance Processes: Diagnosing Contemporary Practices and Competing Theories
Whereas previous studies have been primarily focused on the structural features of Information Technology governance, this paper describes an exploratory study of IT governance pr...
Pieter M. A. Ribbers, Ryan Peterson, Marylin M. Pa...
CAISE
2005
Springer
14 years 3 months ago
A Meta Model for Process Mining Data
Abstract. Modern process-aware information systems store detailed information about processes as they are being executed. This kind of information can be used for very different p...
Boudewijn F. van Dongen, Wil M. P. van der Aalst