Buscar
Mostrando ítems 31-40 de 50
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Extending BPMN 2.0 for Modelling the Combination of Activities That Involve Data Constraints
(Springer, 2012)
The combination of activities to achieve optimal goals sometimes has a complex solution. Business Process Model and Notation (BPMN) 2.0 facilitates the modelling of business processes by providing new artifacts, such ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Verifying the manipulation of data objects according to business process and data models
(Springer, 2020)
Business processes read and write data objects, usually stored in databases. Although data models and activity-oriented business process models originate from different paradigms, they need to work together properly. The ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Run-Time Auditing for Business Processes Data Using Constraints
(Springer, 2010)
Business processes involve data that can be modified or up dated by various activities. These data must satisfy the business rules associated to the process. These data are normally stored in a rela tional database, and ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Residue-residue Contact Prediction based on Evolutionary Computation
(Springer, 2011)
In this study, a novel residue-residue contacts prediction approach based on evolutionary computation is presented. The prediction is based on four amino acids properties. In particular, we consider the hydrophobicity, ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Decision-Making Support for the Correctness of Input Data at Runtime in Business Processes
(World Scientific, 2014)
In a business process, the information that flows between the activities can be introduced by those users who interact with the process. This introduced information could be incorrect due to a lack of knowledge or a mistake. ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Contract-based Diagnosis for Business Process Instances using Business Compliance Rules
(PHM Society, 2010)
In order to increase the quality of business pro cesses when they are automated, the correctness of the activities can be checked by means of an analysis of the corresponding business compli ance rules. By analyzing the ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Curso de Especialización en Ciberseguridad, ¿están preparados nuestros docentes?
(Universidad de Castilla-La Mancha, 2021)
La aparición del nuevo título de Formación Profesional, Curso de Especialización en “Ciberseguridad en entornos de tecnologías de la información”, establece el punto de partida sobre los conocimientos del profesorado ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Model-Driven Engineering for Constraint Database Query Evaluation
(IDMPP, 2011)
Data used in applications such as CAD, CAM or GIS are complex, but the techniques developed for their treatment and stor age are not adapted enough to their needs. Examples of these types of data are spatiotemporal, ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Determining the best set of seismicity indicators to predict earthquakes. Two case studies: Chile and the Iberian Peninsula
(Elsevier, 2013)
This work explores the use of different seismicity indicators as inputs for artificial neural networks. The combination of multiple indicators that have already been successfully used in different seismic zones by the ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Mining quantitative association rules based on evolutionary computation and its application to atmospheric pollution
(IOS Press, 2010)
This research presents the mining of quantitative association rules based on evolutionary computation techniques. First, a real-coded genetic algorithm that extends the well-known binary-coded CHC algorithm has been ...