This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
The semantics of the OR-join in business process modeling languages like EPCs or YAWL have been discussed for a while. Still, the existing solutions suffer from at least one of two...
The use of requirements traceability for information systems development (ISD) projects is not very common in practice despite its often mentioned advantages in the literature. We ...
The management and maintenance of a large number of Web services is not easy and, in particular, needs appropriate authorization policies to be defined so as to realize reliable an...
Abstract. Most of today's business applications have to deal with automated workflows. In this paper, we argue that the blackboard pattern can be used to create an architectur...
Stefan Kleine Stegemann, Burkhardt Funk, Thomas Sl...
In this paper, we propose the technique to define the metrics of model transformation using a meta-modeling technique and a graph rewriting techniques in a Model Driven Developmen...
In this article we will focus on the business rule modeling constructs and methodology in the fact-oriented approach for the third perspective from the IFIP CRIS framework: the beh...
Enterprises require mechanisms to ensure that their business processes implement and fulfill internal controls in context of regulatory compliance such as Sarbanes Oxley Act. In th...
Data cleaning is the process of correcting anomalies in a data source, that may for instance be due to typographical errors, or duplicate representations of an entity. It is a cruc...
Radio frequency identification (RFID), and more recently the development of Near Field Communication (NFC) technology, have popularized the idea of linking real-world products wit...