Sciweavers

915 search results - page 52 / 183
» Security in Business Process Engineering
Sort
View
ICSE
2003
IEEE-ACM
14 years 7 months ago
Patterns Approach to Building Software Systems
This position paper suggests an approach for building software systems using patterns, right from business architecture to software architecture. Further, the approach incorporate...
Satish Chandra, Satyendra Bhattaram
ICDE
2007
IEEE
131views Database» more  ICDE 2007»
14 years 2 months ago
Enhancing Secured Service Interoperability with Decentralized Orchestration
Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled...
Ustun Yildiz, Claude Godart
SAC
2004
ACM
14 years 1 months ago
WebUml: reverse engineering of web applications
Web applications have become complex and crucial for many firms, especially when combined with areas such as CRM (Customer Relationship Management) and BPR (Business Process Reen...
Carlo Bellettini, Alessandro Marchetto, Andrea Tre...
RE
2006
Springer
13 years 7 months ago
Goal-Oriented Requirements Engineering, Part II
We briefly review the history and key ideas in Goal-Oriented Requirements Engineering research. We then sketch two applications of these ideas. The first involves establishing an ...
John Mylopoulos
ENTER
2010
Springer
14 years 2 months ago
An Analysis of Search Engine Use for Travel Planning
Search engines have become a central part of the internet marketing strategy of tourism businesses and, as such, it is essential that destination marketing organizations have a su...
Daniel R. Fesenmaier, Zheng Xiang, Bing Pan, Rob L...