Buscar
Mostrando ítems 31-40 de 62
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models
(IEEE Computer Society, 2019)
Organizations execute daily activities to meet their objectives. The performance of these activities can be fundamental for achieving a business objective, but they also imply the assumption of certain security risks ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Empowering conformance checking using Big Data through horizontal decomposition
(Elsevier, 2021)
Conformance checking unleashes the full power of process mining: techniques from this discipline enable the analysis of the quality of a process model through the discovery of event data, the identification of potential ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Governance Knowledge Management and Decision Support Using Fuzzy Governance Maps
(Springer, 2016)
Business process management systems incorporate the pos sibility of monitoring the behaviour of a company, by observing their business process indicators. Depending on the process executed, and the order of their ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Decision-making support for input data in business processes according to former instances
(ComSIS Consortium, 2021)
Business Processes facilitate the execution of a set of activities to achieve the strategic plans of a company. During the execution of a business process model, several decisions can be made that frequently involve the ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Extending BPMN 2.0 for Modelling the Combination of Activities That Involve Data Constraints
(Springer, 2012)
The combination of activities to achieve optimal goals sometimes has a complex solution. Business Process Model and Notation (BPMN) 2.0 facilitates the modelling of business processes by providing new artifacts, such ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Verifying the manipulation of data objects according to business process and data models
(Springer, 2020)
Business processes read and write data objects, usually stored in databases. Although data models and activity-oriented business process models originate from different paradigms, they need to work together properly. The ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Run-Time Auditing for Business Processes Data Using Constraints
(Springer, 2010)
Business processes involve data that can be modified or up dated by various activities. These data must satisfy the business rules associated to the process. These data are normally stored in a rela tional database, and ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Developing a labelled object-relational constraint database architecture for the projection operator
(Elsevier, 2009)
Current relational databases have been developed in order to improve the handling of stored data, however, there are some types of information that have to be analysed for which no suitable tools are available. These new ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Measuring data‑centre workfows complexity through process mining: the Google cluster case
(Springer, 2020)
Data centres have become the backbone of large Cloud services and applica-tions, providing virtually unlimited elastic and scalable computational and storage resources. The search for the efficiency and optimisation ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Decision-Making Support for the Correctness of Input Data at Runtime in Business Processes
(World Scientific, 2014)
In a business process, the information that flows between the activities can be introduced by those users who interact with the process. This introduced information could be incorrect due to a lack of knowledge or a mistake. ...