Sciweavers

378 search results - page 16 / 76
» Security requirement analysis of business processes
Sort
View
VRML
2000
ACM
13 years 12 months ago
3D gadgets for business process visualization - a case study
Business visualization is becoming increasingly important, since managers recognize the power of human visual intuition in information-rich decision tasks. Nevertheless, despite i...
Bastiaan Schönhage, Alex van Ballegooij, Anto...
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
14 years 6 days ago
Coordination analysis: a method for deriving use cases from process dependencies
Despite the widespread recognition that information technology (IT) and business process are tightly connected, existing system design methods provide limited guidance on how to t...
Xiang Michelle Liu, George M. Wyner
ZEUS
2010
180views Communications» more  ZEUS 2010»
13 years 9 months ago
An efficient approach to detect lack of synchronization in acyclic workflow graphs
Control-flow analysis of business process models requires to check the absence of lack of synchronization. We use workflow graphs, which may contain inclusive OR gateways, to repre...
Cédric Favre
MKWI
2008
153views Business» more  MKWI 2008»
13 years 9 months ago
A Reference Architecture for Semantic Business Process Management Systems
: Semantic Business Process Management (SBPM) enhances BPM with semantic technologies in order to increase the degree of automation in the BPM lifecycle and help in bridging the ga...
Dimka Karastoyanova, Tammo van Lessen, Frank Leyma...
BIS
2008
92views Business» more  BIS 2008»
13 years 9 months ago
Structural Detection of Deadlocks in Business Process Models
Abstract. A common task in business process modelling is the verification of process models regarding syntactical and structural errors. While the former might be checked with low ...
Ahmed Awad, Frank Puhlmann