There is an ongoing debate about how to improve the quality of empirical research efforts in information systems. One of the persistent issues within the debate concerns the relat...
We introduce a novel person identification method for a surveillance system of much wider area than conventional systems using CCTV cameras. In the proposed system, we install cam...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
Process mining is the extraction of a process model from system logs. These logs have to meet minimum requirements, i.e. each event should refer to a case and a task. Many system ...
Monique H. Jansen-Vullers, Wil M. P. van der Aalst...
Due to a turbulent market enterprises should be able to adapt their business processes in a quick and flexible way. This requires adaptive process-aware information systems (PAISs)...
Stefanie Rinderle-Ma, Manfred Reichert, Barbara We...