-
2
-
-
78649485762
-
Time prediction based on process mining
-
van der Aalst, W.M.P., Schonenberg, M.H., Song, M.: Time prediction based on process mining. Information Systems 36(2), 450-475 (2011)
-
(2011)
Information Systems
, vol.36
, Issue.2
, pp. 450-475
-
-
Van Der Aalst, W.M.P.1
Schonenberg, M.H.2
Song, M.3
-
3
-
-
38349013112
-
Dynamic, Extensible and Context-Aware Exception Handling for Workflows
-
Meersman, R., Tari, Z. (eds.) OTM 2007, Part I. Springer, Heidelberg
-
Adams, M., ter Hofstede, A.H.M., van der Aalst,W.M.P., Edmond, D.: Dynamic, Extensible and Context-Aware Exception Handling for Workflows. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part I. LNCS, vol. 4803, pp. 95-112. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4803
, pp. 95-112
-
-
Adams, M.1
Ter Hofstede, A.H.M.2
Van Der Aalst, W.M.P.3
Edmond, D.4
-
4
-
-
9944262089
-
-
version 2.0. Technical Report CMU/SEI-2001-TR-016, Carnegie Mellon University
-
Alberts, C.J., Dorofee, A.J.: OCTAVE criteria, version 2.0. Technical Report CMU/SEI-2001-TR-016, Carnegie Mellon University (2001)
-
(2001)
OCTAVE Criteria
-
-
Alberts, C.J.1
Dorofee, A.J.2
-
5
-
-
4544224898
-
A work system view of DSS in its fourth decade
-
December
-
Alter, S.: A work system view of DSS in its fourth decade. In: DSS, vol. 38 (December 2004)
-
(2004)
DSS
, vol.38
-
-
Alter, S.1
-
6
-
-
0001094070
-
The use of the CCTA Risk Analysis and Management Methodology CRAMM in health information systems
-
North Holland Publishing
-
Barber, B., Davey, J.: The use of the CCTA Risk Analysis and Management Methodology CRAMM in health information systems. In: MEDINFO. North Holland Publishing (1992)
-
(1992)
MEDINFO
-
-
Barber, B.1
Davey, J.2
-
8
-
-
80455132246
-
Risk-aware business process modeling and simulation using xml nets
-
September
-
Betz, S., Hickl, S.,Oberweis, A.: Risk-aware business process modeling and simulation using xml nets. In: IEEE CEC, pp. 349-356 (September 2011)
-
(2011)
IEEE CEC
, pp. 349-356
-
-
Betz, S.1
Hickl, S.2
Oberweis, A.3
-
9
-
-
34547806176
-
AO4BPEL: An aspect-oriented extension to BPEL
-
Charfi, A.,Mezini,M.: AO4BPEL: An aspect-oriented extension to BPEL. In:WWW(2007)
-
(2007)
WWW
-
-
Charfi, A.1
Mezini, M.2
-
10
-
-
70349319676
-
Controllability in Temporal Conceptual Workflow Schemata
-
Dayal, U., Eder, J., Koehler, J., Reijers, H.A. (eds.) BPM 2009.
-
Combi, C., Posenato, R.: Controllability in Temporal Conceptual Workflow Schemata. In: Dayal, U., Eder, J., Koehler, J., Reijers, H.A. (eds.) BPM 2009. LNCS, vol. 5701, pp. 64-79.
-
LNCS
, vol.5701
, pp. 64-79
-
-
Combi, C.1
Posenato, R.2
-
11
-
-
77950468997
-
IEC 61025 Fault Tree Analysis
-
International Electrotechnical Commission
-
International Electrotechnical Commission. IEC 61025 Fault Tree Analysis, FTA (1990)
-
(1990)
FTA
-
-
-
12
-
-
81255198589
-
History-Aware, Real-Time Risk Detection in Business Processes
-
Meersman, R., Dillon, T., Herrero, P., Kumar, A., Reichert, M., Qing, L., Ooi, B.-C., Damiani, E., Schmidt, D.C., White, J., Hauswirth, M., Hitzler, P., Mohania, M. (eds.) OTM 2011, Part I. Springer, Heidelberg
-
Conforti, R., Fortino, G., La Rosa, M., ter Hofstede, A.H.M.: History-Aware, Real-Time Risk Detection in Business Processes. In: Meersman, R., Dillon, T., Herrero, P., Kumar, A., Reichert, M., Qing, L., Ooi, B.-C., Damiani, E., Schmidt, D.C., White, J., Hauswirth, M., Hitzler, P., Mohania, M. (eds.) OTM 2011, Part I. LNCS, vol. 7044, pp. 100-118. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7044
, pp. 100-118
-
-
Conforti, R.1
Fortino, G.2
La Rosa, M.3
Ter Hofstede, A.H.M.4
-
13
-
-
84883112669
-
Automated risk mitigation in business processes (extended version)
-
ePrints 49331
-
Conforti, R., ter Hofstede, A.H.M., La Rosa, M., Adams, M.J.: Automated risk mitigation in business processes (extended version). QUT ePrints 49331 (2012)
-
(2012)
QUT
-
-
Conforti, R.1
Ter Hofstede, A.H.M.2
La Rosa, M.3
Adams, M.J.4
-
14
-
-
77955072995
-
Incorporating risk into business process models
-
Cope, E.W., Kuster, J.M., Etzweiler, D., Deleris, L.A., Ray, B.: Incorporating risk into business process models. IBM Journal of Research and Development 54(3), 4:1-4:13 (2010)
-
(2010)
IBM Journal of Research and Development
, vol.54
, Issue.3
-
-
Cope, E.W.1
Kuster, J.M.2
Etzweiler, D.3
Deleris, L.A.4
Ray, B.5
-
15
-
-
67349115986
-
The ADEPT project: A decade of research and development for robust and flexible process support
-
Dadam, P., Reichert, M.: The ADEPT project: a decade of research and development for robust and flexible process support. CSRD 23, 81-97 (2009)
-
(2009)
CSRD
, vol.23
, pp. 81-97
-
-
Dadam, P.1
Reichert, M.2
-
17
-
-
80052784653
-
Automated Error Correction of Business Process Models
-
Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. Springer, Heidelberg
-
Gambini, M., La Rosa, M., Migliorini, S., Ter Hofstede, A.H.M.: Automated Error Correction of Business Process Models. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 148-165. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6896
, pp. 148-165
-
-
Gambini, M.1
La Rosa, M.2
Migliorini, S.3
Ter Hofstede, A.H.M.4
-
18
-
-
77957907021
-
Using complex event processing for dynamic business process adaptation
-
IEEE
-
Hermosillo, G., Seinturier, L., Duchien, L.: Using complex event processing for dynamic business process adaptation. In: SCC, pp. 466-473. IEEE (2010)
-
(2010)
SCC
, pp. 466-473
-
-
Hermosillo, G.1
Seinturier, L.2
Duchien, L.3
-
19
-
-
84892263305
-
-
Springer
-
ter Hofstede, A.H.M., van der Aalst, W.M.P., Adams, M., Russell, N. (eds.): Modern Business Process Automation: YAWL and its Support Environment. Springer (2010)
-
(2010)
Modern Business Process Automation: YAWL and Its Support Environment
-
-
Ter Hofstede, A.H.M.1
Van Der Aalst, W.M.P.2
Adams, M.3
Russell, N.4
-
20
-
-
33947390898
-
Operational risk analysis in business processes
-
Jallow, A.K., Majeed, B., Vergidis, K., Tiwari, A., Roy, R.: Operational risk analysis in business processes. BTTJ 25(1), 168-177 (2007)
-
(2007)
BTTJ
, vol.25
, Issue.1
, pp. 168-177
-
-
Jallow, A.K.1
Majeed, B.2
Vergidis, K.3
Tiwari, A.4
Roy, R.5
-
23
-
-
4344689453
-
AgentWork: A workflow system supporting rule-based workflow adaptation
-
Muller, R., Greiner, U., Rahm, E.: AgentWork: a workflow system supporting rule-based workflow adaptation. Data & Knowledge Engineering 51(2), 223-256 (2004)
-
(2004)
Data & Knowledge Engineering
, vol.51
, Issue.2
, pp. 223-256
-
-
Muller, R.1
Greiner, U.2
Rahm, E.3
-
24
-
-
84870652321
-
Integrating risks in business process models with value focused process engineering
-
Neiger, D., Churilov, L., zur Muehlen, M., Rosemann, M.: Integrating risks in business process models with value focused process engineering. In: ECIS. AISeL (2006)
-
(2006)
ECIS. AISeL
-
-
Neiger, D.1
Churilov, L.2
Zur Muehlen, M.3
Rosemann, M.4
-
25
-
-
52249109815
-
Toward webscale workflows for film production
-
Ouyang, C., La Rosa, M., ter Hofstede, A.H.M., Dumas, M., Shortland, K.: Toward webscale workflows for film production. IEEE, Internet Computing 12(5), 53-61 (2008)
-
(2008)
IEEE, Internet Computing
, vol.12
, Issue.5
, pp. 53-61
-
-
Ouyang, C.1
La Rosa, M.2
Ter Hofstede, A.H.M.3
Dumas, M.4
Shortland, K.5
-
26
-
-
33746101027
-
Workflow Exception Patterns
-
Martinez, F.H., Pohl, K. (eds.) CAiSE 2006. Springer, Heidelberg
-
Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M.: Workflow Exception Patterns. In: Martinez, F.H., Pohl, K. (eds.) CAiSE 2006. LNCS, vol. 4001, pp. 288-302. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4001
, pp. 288-302
-
-
Russell, N.1
Van Der Aalst, W.M.P.2
Ter Hofstede, A.H.M.3
-
27
-
-
78650300210
-
Risk driven process engineering in digital ecosystems: Modelling risk
-
Sienou, A., Lamine, E., Pingaud, H., Karduck, A.P.: Risk driven process engineering in digital ecosystems: Modelling risk. In: Proc. of IEEE DEST, pp. 647-650 (2010)
-
(2010)
Proc. of IEEE DEST
, pp. 647-650
-
-
Sienou, A.1
Lamine, E.2
Pingaud, H.3
Karduck, A.P.4
-
28
-
-
57149123339
-
Dominance-based multiobjective simulated annealing
-
Smith, K.I., Everson, R.M., Fieldsend, J.E., Murphy, C., Misra, R.: Dominance-based multiobjective simulated annealing. IEEE TEC 12(3), 323-342 (2008)
-
(2008)
IEEE TEC
, vol.12
, Issue.3
, pp. 323-342
-
-
Smith, K.I.1
Everson, R.M.2
Fieldsend, J.E.3
Murphy, C.4
Misra, R.5
-
30
-
-
80054027960
-
RiskM: A multi-perspective modeling method for IT risk assessment
-
Strecker, S., Heise, D., Frank, U.: RiskM: A multi-perspective modeling method for IT risk assessment. Information Systems Frontiers, 1-17 (2010)
-
(2010)
Information Systems Frontiers
, pp. 1-17
-
-
Strecker, S.1
Heise, D.2
Frank, U.3
-
31
-
-
84872774875
-
Current research in risk-aware business process management - Overview, comparison, and gap analysis
-
ePrints 50606
-
Suriadi, S., Weiß, B., Winkelmann, A., ter Hofstede, A., Wynn, M., Ouyang, C., Adams, M.J., Conforti, R., Fidge, C., La Rosa, M., Pika, A.: Current research in risk-aware business process management - overview, comparison, and gap analysis. QUT ePrints 50606 (2012)
-
(2012)
QUT
-
-
Suriadi, S.1
Weiß, B.2
Winkelmann, A.3
Ter Hofstede, A.4
Wynn, M.5
Ouyang, C.6
Adams, M.J.7
Conforti, R.8
Fidge, C.9
La Rosa, M.10
Pika, A.11
-
32
-
-
4944250730
-
The consistency of task-based authorization constraints in workflow
-
June
-
Tan, K., Crampton, J., Gunter, C.A.: The consistency of task-based authorization constraints in workflow. In: Proc. of IEEE CSFW, pp. 155-169 (June 2004)
-
(2004)
Proc. of IEEE CSFW
, pp. 155-169
-
-
Tan, K.1
Crampton, J.2
Gunter, C.A.3
-
33
-
-
81455154648
-
A formal approach enabling risk-aware business process modeling and simulation
-
Tjoa, S., Jakoubi, S., Goluch, G., Kitzler, G., Goluch, S., Quirchmayr, G.: A formal approach enabling risk-aware business process modeling and simulation. IEEE TSC 4(2) (2011)
-
(2011)
IEEE TSC
, vol.4
, Issue.2
-
-
Tjoa, S.1
Jakoubi, S.2
Goluch, G.3
Kitzler, G.4
Goluch, S.5
Quirchmayr, G.6
-
34
-
-
84872766869
-
-
Voluntary Inter-industry Commerce Standard (VICS), accessed: June 2011
-
Voluntary Interindustry Commerce Solutions Association. Voluntary Inter-industry Commerce Standard (VICS), http://www.vics.org (accessed: June 2011)
-
-
-
-
35
-
-
33748053971
-
Inter-instance authorization constraints for secure workflow management
-
ACM, New York
-
Warner, J., Atluri, V.: Inter-instance authorization constraints for secure workflow management. In: Proc. of SACMAT, pp. 190-199. ACM, New York (2006)
-
(2006)
Proc. of SACMAT
, pp. 190-199
-
-
Warner, J.1
Atluri, V.2
-
36
-
-
35048847096
-
CBRFlow: Enabling Adaptive Workflow Management Through Conversational Case-Based Reasoning
-
Funk, P., González Calero, P.A. (eds.) ECCBR 2004. Springer, Heidelberg
-
Weber, B., Wild, W., Feige, U.: CBRFlow: Enabling Adaptive Workflow Management Through Conversational Case-Based Reasoning. In: Funk, P., González Calero, P.A. (eds.) ECCBR 2004. LNCS (LNAI), vol. 3155, pp. 434-448. Springer, Heidelberg (2004)
-
(2004)
LNCS (LNAI)
, vol.3155
, pp. 434-448
-
-
Weber, B.1
Wild, W.2
Feige, U.3
|