This paper will present an approach that fosters a seamless integration of documents with corporate information systems. It is based on a conceptually enhanced notion of documents...
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Process mining has proven to be a valuable tool for analyzing operational process executions based on event logs. Existing techniques perform well on structured processes, but stil...
In this paper, we present an approach based on hierarchically structured business models as artifacts of business process modeling that are used in a stepwise acquisition process f...
When dealing with ill-posed inverse problems in data analysis, the Bayesian approach allows one to use prior information to guide the result toward reasonable solutions. In this w...
K. M. Hanson, G. S. Cunningham, G. R. Jennings Jr....