Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
This report will present a collection of tools that supports the precise definition, careful analysis, and execution of processes that coordinate the actions of humans, automated d...
Leon J. Osterweil, Lori A. Clarke, George S. Avrun...
Process mining refers to the extraction of process models from event logs. Real-life processes tend to be less structured and more flexible. Traditional process mining algorithms ...
R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aa...
Alaska Simulator is an interactive software tool developed at the University of Innsbruck which allows people to explore different approaches to process flexibility by using a fami...
Barbara Weber, Stefan Zugal, Jakob Pinggera, Werne...
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications and o...