Abstract. In requirements engineering we have to discover the user requirements and then we have to transform them into precise system specifications. There are two essential aspec...
Michel R. V. Chaudron, Kees M. van Hee, Lou J. Som...
We present a general methodology for integrating arbitrary security requirements in the development of business processes in a both elegant and rigorous way. We show how trust rela...
Abstract. Business Process Management (BPM) includes methods, techniques, and tools to support the design, enactment, management, and analysis of operational business processes. It...
Wil M. P. van der Aalst, Arthur H. M. ter Hofstede...
In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security ...
This paper presents the design and implementation of an intelligent transportation web service (ITWS) and studies various QoS requirements for the web service infrastructure. In p...
Chun-Hsin Wu, Da-Chun Su, Justin Chang, Chia-Chen ...
The great amount of information that a user handles in their typical transactions on the Internet –identifiers, addresses, credit card numbers, among others-, makes it necessary...
In this paper, we investigate the use of reinforcement learning (RL) techniques to the problem of determining dynamic prices in an electronic retail market. As representative mode...
Web services have a potential to enhance B2B ecommerce over the Internet by allowing companies and organizations to publish their business processes on service directories where p...
Andreas Wombacher, Peter Fankhauser, Bendick Mahle...