Sciweavers

249 search results - page 43 / 50
» Modelling Security Goals in Business Processes
Sort
View
DEBS
2007
ACM
13 years 9 months ago
Identification of suspicious, unknown event patterns in an event cloud
This paper describes an approach to detect unknown event patterns. In this context, an event is not only something that happens, but also something that can be analysed. This task...
Alexander Widder, Rainer von Ammon, Philippe Schae...
ATAL
2005
Springer
14 years 1 months ago
Formalizing and achieving multiparty agreements via commitments
Multiparty agreements often arise in a multiagent system where autonomous agents interact with each other to achieve a global goal. Multiparty agreements are traditionally represe...
Feng Wan, Munindar P. Singh
WER
2004
Springer
14 years 29 days ago
A pattern language to join early and late requirements
At present, the early phase of Requirements Engineering is a new research area in the Software Engineering field. This phase is concerned with the analysis of the organizational c...
Alicia Martínez, Oscar Pastor, Hugo Estrada
SIGMOD
2002
ACM
127views Database» more  SIGMOD 2002»
13 years 7 months ago
Workflow management with service quality guarantees
Workflow management systems (WFMS) that are geared for the orchestration of business processes across multiple organizations are complex distributed systems: they consist of multi...
Michael Gillmann, Gerhard Weikum, Wolfgang Wonner
MSOM
2007
105views more  MSOM 2007»
13 years 7 months ago
Managing a Bank's Currency Inventory Under New Federal Reserve Guidelines
New currency recirculation guidelines implemented by the Federal Reserve System (Fed) of the United States are intended to reduce the overuse of its currency processing services b...
H. Neil Geismar, Milind Dawande, Divakar Rajamani,...