Sciweavers

915 search results - page 74 / 183
» Security in Business Process Engineering
Sort
View
VAMOS
2007
Springer
14 years 4 months ago
Exploring the Dimensions of Variability: a Requirements Engineering Perspective
Goal models have been found to be effective for representing and analyzing variability at the early requirements level, by comprehensibly representing all alternative ways by whic...
Sotirios Liaskos, Lei Jiang, Alexei Lapouchnian, Y...
ICADL
2010
Springer
160views Education» more  ICADL 2010»
14 years 2 months ago
Thesaurus Extension Using Web Search Engines
Maintaining and extending large thesauri is an important challenge facing digital libraries and IT businesses alike. In this paper we describe a method building on and extending ex...
Robert Meusel, Mathias Niepert, Kai Eckert, Heiner...
INFSOF
2008
108views more  INFSOF 2008»
13 years 10 months ago
Effectively utilizing project, product and process knowledge
Improving project management, product development and engineering processes is for many companies crucial to survive in a fast changing environment. However, these activities are ...
Christof Ebert, Jozef De Man
JMLR
2010
157views more  JMLR 2010»
13 years 4 months ago
Causality Challenge: Benchmarking relevant signal components for effective monitoring and process control
A complex modern manufacturing process is normally under consistent surveillance via the monitoring of signals/variables collected from sensors. However, not all of these signals ...
Michael McCann, Yuhua Li, Liam P. Maguire, Adrian ...
DEEC
2006
IEEE
14 years 1 months ago
A Bottom-Up Workflow Mining Approach for Workflow Applications Analysis
Abstract. Engineering workflow applications are becoming more and more complex, involving numerous interacting business objects within considerable processes. Analysing the interac...
Walid Gaaloul, Karim Baïna, Claude Godart