Buscar
Mostrando ítems 31-40 de 50
Ponencia
Extending BPMN 2.0 for Modelling the Combination of Activities That Involve Data Constraints
(Springer, 2012)
The combination of activities to achieve optimal goals sometimes has a complex solution. Business Process Model and Notation (BPMN) 2.0 facilitates the modelling of business processes by providing new artifacts, such ...
Artículo
Verifying the manipulation of data objects according to business process and data models
(Springer, 2020)
Business processes read and write data objects, usually stored in databases. Although data models and activity-oriented business process models originate from different paradigms, they need to work together properly. The ...
Ponencia
Run-Time Auditing for Business Processes Data Using Constraints
(Springer, 2010)
Business processes involve data that can be modified or up dated by various activities. These data must satisfy the business rules associated to the process. These data are normally stored in a rela tional database, and ...
Ponencia
Residue-residue Contact Prediction based on Evolutionary Computation
(Springer, 2011)
In this study, a novel residue-residue contacts prediction approach based on evolutionary computation is presented. The prediction is based on four amino acids properties. In particular, we consider the hydrophobicity, ...
Artículo
Decision-Making Support for the Correctness of Input Data at Runtime in Business Processes
(World Scientific, 2014)
In a business process, the information that flows between the activities can be introduced by those users who interact with the process. This introduced information could be incorrect due to a lack of knowledge or a mistake. ...
Ponencia
Contract-based Diagnosis for Business Process Instances using Business Compliance Rules
(PHM Society, 2010)
In order to increase the quality of business pro cesses when they are automated, the correctness of the activities can be checked by means of an analysis of the corresponding business compli ance rules. By analyzing the ...
Ponencia
Curso de Especialización en Ciberseguridad, ¿están preparados nuestros docentes?
(Universidad de Castilla-La Mancha, 2021)
La aparición del nuevo título de Formación Profesional, Curso de Especialización en “Ciberseguridad en entornos de tecnologías de la información”, establece el punto de partida sobre los conocimientos del profesorado ...
Ponencia
Model-Driven Engineering for Constraint Database Query Evaluation
(IDMPP, 2011)
Data used in applications such as CAD, CAM or GIS are complex, but the techniques developed for their treatment and stor age are not adapted enough to their needs. Examples of these types of data are spatiotemporal, ...
Artículo
Determining the best set of seismicity indicators to predict earthquakes. Two case studies: Chile and the Iberian Peninsula
(Elsevier, 2013)
This work explores the use of different seismicity indicators as inputs for artificial neural networks. The combination of multiple indicators that have already been successfully used in different seismic zones by the ...
Artículo
Mining quantitative association rules based on evolutionary computation and its application to atmospheric pollution
(IOS Press, 2010)
This research presents the mining of quantitative association rules based on evolutionary computation techniques. First, a real-coded genetic algorithm that extends the well-known binary-coded CHC algorithm has been ...