Sciweavers

68 search results - page 12 / 14
» Model Checking of Security-Sensitive Business Processes
Sort
View
ICSOC
2010
Springer
13 years 8 months ago
Service Discovery Using Communication Fingerprints
A request to a service registry must be answered with a service that fits in several regards, including semantic compatibility, non-functional compatibility, and interface compati...
Olivia Oanea, Jan Sürmeli, Karsten Wolf
BPM
2004
Springer
148views Business» more  BPM 2004»
14 years 1 months ago
Interactive Workflow Mining
Many information systems log event data about executed tasks. Workflow mining is concerned with the derivation of a graphical workflow model out of this data. Experience from appl...
Markus Hammori, Joachim Herbst, Niko Kleiner
SAC
2010
ACM
13 years 10 months ago
Data-aware design and verification of service compositions with Reo and mCRL2
Service-based systems can be modeled as stand-alone services coordinated by external connectors. Reo is a channelbased coordination language with well-defined semantics that enabl...
Natallia Kokash, Christian Krause, Erik P. de Vink
ICCCI
2009
Springer
14 years 2 months ago
A Multi-agent Model of Deceit and Trust in Intercultural Trade
Trust is a sine qua non for trade. According to transaction cost economics, a contract always offers some opportunity to defect. In the case of asymmetric product information, wher...
Gert Jan Hofstede, Catholijn M. Jonker, Tim Verwaa...
AIM
2006
13 years 11 months ago
Observing the use of BPM tools: A step towards flexibility
: The development of the tools of Business Process Management (BPM) arises from the spread of the notion of process in the management universe. The application of BPM to strategic ...
Joseph Heili, Jean-Mathias Heraud, Laure France