Sciweavers

915 search results - page 54 / 183
» Security in Business Process Engineering
Sort
View
B
2007
Springer
13 years 11 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
AGILEDC
2004
IEEE
13 years 11 months ago
Aligning Strategic Planning with Agile Development: Extending Agile Thinking to Business Improvement
Many development teams have successfully used Agile Development to build quality software, but often these projects have failed to effectively contribute to overall company succes...
Colin Rand, Bruce Eckfeldt
ECAI
2008
Springer
13 years 9 months ago
QuestSemantics - Intelligent Search and Retrieval of Business Knowledge
Keyword-based search engines, though hugely popular, are limited when trying to answer very specific queries. The processing of search results is performed by users, rather than th...
Ian Blacoe, Ignazio Palmisano, Valentina A. M. Tam...
AGILEDC
2006
IEEE
14 years 1 months ago
Appropriate Agile Measurement: Using Metrics and Diagnostics to Deliver Business Value
Agile Software Development continually measures both our product and the process used to create it, to allow improvement. With increased popularity, more risk-averse groups are be...
Deborah Hartmann, Robin Dymond
BPM
2008
Springer
115views Business» more  BPM 2008»
13 years 9 months ago
Workflows in Dynamic Development Processes
Process management systems are used in many domains to monitor and control processes. Development processes require specific support, which is not provided by conventional workflow...
Thomas Heer, Christoph Briem, René Wör...