feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV049396801
    Format: 1 Online-Ressource (xxiv, 224 Seiten) , 50 Illustrationen, 33 in Farbe
    ISBN: 9783031465871
    Series Statement: Lecture notes in computer science 14367
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-46586-4
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-46588-8
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Proper, Erik 1967-
    Author information: Sinderen, Marten van
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almafu_BV048495998
    Format: 1 Online-Ressource (xxiii, 271 Seiten) : , 67 Illustrationen, 46 in Farbe.
    ISBN: 978-3-031-17604-3
    Series Statement: Lecture notes in computer science 13585
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-17603-6
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-17605-0
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift ; Konferenzschrift ; Konferenzschrift ; Konferenzschrift ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV049640401
    Format: 1 Online-Ressource (XIII, 372 p. 134 illus., 87 illus. in color)
    Edition: 1st ed. 2024
    ISBN: 9783031547126
    Series Statement: Lecture Notes in Business Information Processing 498
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-54711-9
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-54713-3
    Language: English
    Subjects: Economics
    RVK:
    Keywords: Unternehmen ; Datenverarbeitung ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV024614441
    Format: XX, 203 S. , graph. Darst.
    ISBN: 9783832257095 , 3832257098
    Series Statement: Berichte aus der Informatik
    Note: Zugl.: Darmstadt, Techn. Univ., Diss., 2006
    Language: English
    Keywords: Hochschulschrift
    Author information: Karastoyanova, Dimka 1975-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV049408628
    Format: 1 Online-Ressource (283 Seiten)
    Edition: 1st ed
    ISBN: 9783031176043
    Series Statement: Lecture Notes in Computer Science Series v.13585
    Note: Description based on publisher supplied metadata and other sources , Intro -- Preface -- Organization -- Keynote Speeches -- "We Are All Digital Now": Platform Systems and Flow Processes in Modern Enterprises -- Smart Modeling of Smart Software -- Modelling Ethical and Legal Norms/Explaining Compliance and Violation -- Tutorial -- Business Process Modeling and Simulation with DPMN -- Contents -- Enterprise Security -- Computable Consent - From Regulatory, Legislative, and Organizational Policies to Security Policies -- 1 Introduction -- 1.1 Problem and Contributions -- 1.2 Related Work -- 2 Towards Consent Automation - FHIR Approach -- 2.1 FHIR Consent Resource - Basic Policy and Computable Policy Expressions -- 2.2 Link with Smart on FHIR Architecture Pattern -- 2.3 Analysis -- 3 Computable Policy Framework -- 3.1 Modelling Concepts for Policy Rules -- 3.2 Policy Language Options -- 3.3 Example - Privacy Consent -- 4 Positioning with FHIR Ecosystem -- 5 Conclusion and Future Work -- References -- A Multi-level Cyber-Security Reference Model in Support of Vulnerability Analysis -- 1 Introduction -- 2 Main Goals, Requirements and Design Decisions -- 3 A Multi-level Reference Model in Support of Vulnerability Analysis -- 4 Demonstration -- 5 Related Work -- 6 Conclusions -- References -- Security Ontologies: A Systematic Literature Review -- 1 Introduction -- 2 Background and Related Work -- 2.1 Security Ontologies -- 2.2 Existing Systematic Literature Review of Security Ontologies -- 3 The Systematic Literature Review -- 3.1 Planning the Systematic Literature Review -- 3.2 Conducting the Systematic Literature Review -- 3.3 Reporting the Systematic Literature Review -- 4 Conclusions and Future Work -- References -- Enterprise Architecture -- Model-Based Construction of Enterprise Architecture Knowledge Graphs -- 1 Introduction -- 2 Background -- 2.1 Enterprise Architecture Analysis , 2.2 Graph-Based Analysis of EA Models -- 2.3 Knowledge Graphs and Enterprise Architecture -- 3 Model-Based EA Knowledge Graph Construction -- 3.1 Knowledge Graph Creation -- 3.2 Knowledge Graph Enrichment -- 3.3 Knowledge Graph Deployment and Application -- 4 An EAKG Archi Plugin -- 5 Case-Based Evaluation -- 6 Conclusive Discussion -- References -- Enterprise Architecture Management Support for Digital Transformation Projects in Very Large Enterprises: A Case Study at a European Mobility Provider -- 1 Introduction -- 2 Theoretical Foundations and Related Work -- 2.1 Enterprise Architecture -- 2.2 Digital Transformation -- 2.3 Enterprise Architecture Support for DT Projects -- 3 Research Approach -- 3.1 Research Method -- 3.2 Context of the Case Study -- 3.3 Data Gathering: Qualitative Expert Interviews -- 3.4 Data Analysis: Document Analysis and Qualitative Content Analysis of the Expert Interviews -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Interoperability of Digital Government Services: A Brazilian Reference Architecture Model to Promote Communication, Management, and Reuse of Solutions -- 1 Introduction -- 2 Materials and Methods -- 2.1 Environment: DT and the Brazilian Government Perspective -- 2.2 Knowledge Base -- 2.3 IS Research Cycle -- 3 The Reference Model for Interoperability Between Entities in the Delivery of Electronic Government Services -- 3.1 The Reference Model -- 3.2 A Proposal for the Model Implementation -- 3.3 Monitoring the Use and Evolving the Reference Model -- 4 Conclusions -- References -- Business Process Modeling and Monitoring -- Modeling, Executing and Monitoring IoT-Driven Business Rules with BPMN and DMN: Current Support and Challenges -- 1 Introduction -- 2 Current Support for IoT-Driven Business Rules in BPMN and BPMN + DMN -- 2.1 IoT-Driven Business Rules in BPMN. , 2.2 IoT-Driven Business Rules in BPMN + DMN -- 3 Challenges -- 3.1 Modeling Challenges -- 3.2 Execution Challenges -- 3.3 Monitoring Challenges -- 4 Conclusion -- References -- Enhanced Transformation of BPMN Models with Cancellation Features -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Business Process Model and Notation -- 3.2 Reset Nets -- 4 Enhanced Transformation of BPMN Models -- 4.1 Modeling Assumptions -- 4.2 Building Reset Nets -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Results -- 5.3 Threats to Validity -- 6 Conclusion -- References -- Next-Activity Prediction for Non-stationary Processes with Unseen Data Variability -- 1 Introduction -- 2 Related Work -- 3 Challenges and Requirements -- 3.1 Data Variability -- 3.2 Challenges of Evidence Based Predictions with Unseen Activities and Sequences -- 3.3 Uncertainty of the Final Activity of a Trace -- 4 Approach -- 4.1 Data Encoding with Unseen Data Variability -- 4.2 Determining the Termination of a Sequence -- 4.3 Online Prediction Process -- 4.4 Prediction Model Update Strategies -- 5 Experiments -- 5.1 Online Prediction Simulation and Model Update -- 5.2 Datasets -- 5.3 Data Pre-processing -- 5.4 Event Data Encoding -- 5.5 LSTM Neural Networks and Model Training -- 5.6 Model Selection -- 5.7 Results -- 6 Conclusion -- References -- Business Process Mining and Discovery -- On the Origin of Questions in Process Mining Projects -- 1 Introduction -- 2 Background -- 3 Research Method -- 3.1 Data Collection -- 3.2 Data Analysis -- 4 Results -- 4.1 Question Formulation: From Event Logs to Questions -- 4.2 Question Refinement: Refining Questions with Process Mining -- 5 Discussion -- 6 Conclusion -- References -- Extracting Business Process Entities and Relations from Text Using Pre-trained Language Models and In-Context Learning -- 1 Introduction -- 2 Background , 2.1 Process Extraction from Text -- 2.2 In-Context Learning -- 2.3 The PET Dataset -- 3 Process Extraction from Text via In-Context Learning -- 3.1 Implementing the Approach -- 4 Empirical Assessment -- 4.1 The Tasks -- 4.2 Experimental Setting -- 4.3 Validation Dataset -- 4.4 Answering the Research Questions -- 5 Further Insights -- 6 Related Work -- 7 Conclusion -- References -- Discovering Sound Free-Choice Workflow Nets with Non-block Structures -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Approach -- 4.1 Ordering Strategies for Adding Activities -- 4.2 Search Space Pruning -- 4.3 Patterns -- 4.4 Selection and Fall-Through -- 5 Evaluation -- 5.1 Experiment Setup -- 5.2 Results -- 6 Conclusion and Future Work -- References -- Shape Your Process: Discovering Declarative Business Processes from Positive and Negative Traces Taking into Account User Preferences -- 1 Introduction -- 2 The Modeling Language -- 3 Why Preferences on the Discovered Models? -- 3.1 Preferences over Process Activities -- 3.2 Preferences over Declare Templates -- 3.3 Preferences over both Activities and Templates -- 4 Discovering Business Processes from Positive and Negative Traces -- 5 Adding Preferences to Process Discovery: An Implementation Through ASPrin -- 5.1 Specifying the Preferences -- 5.2 Exploiting ASPrin for Searching Preferred Models -- 6 Evaluating the Discovery -- 6.1 The DREYERS Log -- 6.2 Evaluation on the CERV Log -- 7 Related Work -- 8 Conclusions -- References -- Process-Driven Applications -- Semi-automated Test Migration for BPMN-Based Process-Driven Applications -- 1 Introduction -- 2 No-Code Approach for Creating Regression Tests -- 3 Related Work -- 4 Overview of the Solution -- 5 Flow Assignment -- 6 Test Impact Analysis -- 6.1 Impact Analysis at Flow Level -- 6.2 Aggregation at Flow Level and Derivation at Test Level , 7 Migration and Test Code Generation -- 8 Evaluation -- 8.1 Experiment Setting -- 8.2 Results and Discussion -- 9 Summary and Outlook -- References -- Splitting Quantum-Classical Scripts for the Generation of Quantum Workflows -- 1 Introduction -- 2 Fundamentals -- 2.1 Hybrid Quantum Algorithms -- 2.2 Quantum Workflows -- 2.3 Deployment Models -- 3 Script Splitting and Workflow Generation -- 3.1 Select Implementation -- 3.2 Add Splitting Markers -- 3.3 Split Script -- 3.4 Generate Quantum Workflow -- 3.5 Generate Incomplete Deployment Models -- 3.6 Complete Deployment Models -- 3.7 Deploy and Execute -- 4 Prototype -- 5 Case Study: Shor's Algorithm -- 6 Discussion -- 7 Related Work -- 8 Summary and Future Work -- References -- Author Index
    Additional Edition: Erscheint auch als Druck-Ausgabe Almeida, João Paulo A. Enterprise Design, Operations, and Computing Cham : Springer International Publishing AG,c2022 ISBN 9783031176036
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949371961702882
    Format: XXIII, 271 p. 67 illus., 46 illus. in color. , online resource.
    Edition: 1st ed. 2022.
    ISBN: 9783031176043
    Series Statement: Lecture Notes in Computer Science, 13585
    Content: This book constitutes the proceedings of the 26th International Conference on Enterprise Design, Operations, and Computing, EDOC 2022, which took place in Bozen-Bolzano, Italy, in October 2022. The 15 full papers included in this book were carefully reviewed and selected from 48 submissions. They were organized in topical sections as follows: enterprise security; enterprise architecture; business process modeling and monitoring; business process mining and discovery; and process-driven applications.
    Note: Enterprise Security -- Computable consent - from regulatory, legislative, and organizational policies to security -- Multi-Level Cyber-Security Reference Model in Support of Vulnerability Analysis -- Security Ontologies: A Systematic Literature Review -- Enterprise Architecture -- Model-based Construction of Enterprise Architecture Knowledge Graphs -- Enterprise Architecture Management Support for Digital Transformation Projects in Very Large Enterprises: A Case Study at a European Mobility Provider -- Interoperability of digital government services: A Brazilian Reference Architecture Model to promote communication, management, and reuse of solutions -- Business Process Modeling and Monitoring -- Modeling, Executing and Monitoring IoT-Driven Business Rules in BPMN and DMN: Current Support and Challenges -- Enhanced Transformation of BPMN Models with Cancellation Features -- Next-Activity Prediction for Non-stationary Processes with Unseen Data Variability -- Business Process Mining and Discovery -- On the Origin of Questions in Process Mining Projects -- Extracting business process entities and relations from text using pre-trained language models and in-context learning -- Discovering Sound Free-choice Workflow Nets With Non-block Structures -- Shape Your Process: Discovering Declarative Business Processes from Positive and Negative Traces Taking into Account User Preferences -- Process-Driven Applications -- Semi-Automated Test Migration for BPMN-based Process-Driven Applications -- Splitting Quantum-Classical Scripts for the Generation of Quantum Workflows.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783031176036
    Additional Edition: Printed edition: ISBN 9783031176050
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    b3kat_BV049479451
    Format: xxiv, 224 Seiten , Illustrationen
    ISBN: 9783031465864
    Series Statement: Lecture notes in computer science 14367
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-3-031-46587-1
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    Author information: Proper, Erik 1967-
    Author information: Sinderen, Marten van
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    gbv_772474559
    Format: Online-Ressource (1 online resource (61 pages))
    Edition: Association for Computing Machinery-Digital Library
    ISBN: 9781450304221
    Series Statement: ACM Digital Library
    Note: Title from The ACM Digital Library
    Language: English
    Keywords: Konferenzschrift
    Author information: Karastoyanova, Dimka 1975-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    gbv_1817969765
    Format: 1 Online-Ressource(XXIII, 271 p. 67 illus., 46 illus. in color.)
    Edition: 1st ed. 2022.
    ISBN: 9783031176043
    Series Statement: Lecture Notes in Computer Science 13585
    Content: Enterprise Security -- Computable consent – from regulatory, legislative, and organizational policies to security -- Multi-Level Cyber-Security Reference Model in Support of Vulnerability Analysis -- Security Ontologies: A Systematic Literature Review -- Enterprise Architecture -- Model-based Construction of Enterprise Architecture Knowledge Graphs -- Enterprise Architecture Management Support for Digital Transformation Projects in Very Large Enterprises: A Case Study at a European Mobility Provider -- Interoperability of digital government services: A Brazilian Reference Architecture Model to promote communication, management, and reuse of solutions -- Business Process Modeling and Monitoring -- Modeling, Executing and Monitoring IoT-Driven Business Rules in BPMN and DMN: Current Support and Challenges -- Enhanced Transformation of BPMN Models with Cancellation Features -- Next-Activity Prediction for Non-stationary Processes with Unseen Data Variability -- Business Process Mining and Discovery -- On the Origin of Questions in Process Mining Projects -- Extracting business process entities and relations from text using pre-trained language models and in-context learning -- Discovering Sound Free-choice Workflow Nets With Non-block Structures -- Shape Your Process: Discovering Declarative Business Processes from Positive and Negative Traces Taking into Account User Preferences -- Process-Driven Applications -- Semi-Automated Test Migration for BPMN-based Process-Driven Applications -- Splitting Quantum-Classical Scripts for the Generation of Quantum Workflows.
    Content: This book constitutes the proceedings of the 26th International Conference on Enterprise Design, Operations, and Computing, EDOC 2022, which took place in Bozen-Bolzano, Italy, in October 2022. The 15 full papers included in this book were carefully reviewed and selected from 48 submissions. They were organized in topical sections as follows: enterprise security; enterprise architecture; business process modeling and monitoring; business process mining and discovery; and process-driven applications.
    Additional Edition: ISBN 9783031176036
    Additional Edition: ISBN 9783031176050
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783031176036
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783031176050
    Language: English
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_9949709231902882
    Format: XXIV, 224 p. 50 illus., 33 illus. in color. , online resource.
    Edition: 1st ed. 2024.
    ISBN: 9783031465871
    Series Statement: Lecture Notes in Computer Science, 14367
    Content: This book constitutes the refereed proceedings of the 27th International Conference on Enterprise Design, Operations, and Computing, EDOC 2023, held in Groningen, The Netherlands, during October 30-November 3, 2023. The 12 full papers included in this book were carefully reviewed and selected from 36submissions. They were organized in topical sections as follows: Enterprise Modeling, Enterprise Architecture & Engineering, Model-Based Software Engineering, Enterprise Analysis with Process Mining, Process Improvement & Engineering, and Modeling in an Enterprise Context.
    Note: Enterprise Modeling, Architecture & Engineering -- A System Ontology for Emergence Modeling -- What do I get from modeling? -- A Generic and Customizable Genetic Algorithms-based Conceptual Model Modularization Platform -- MARTSIA: Enabling Data Confidentiality for Blockchain-based Process Execution -- Model-Based Software Engineering -- Building an Ontological Bridge between Supply Chain Resilience and IoT Applications -- A Model-Driven Approach to SAP S/4HANA Development -- Enterprise Analysis and Improvement with Process Mining -- A Methodology for the Analysis of Robotic Systems via Process Mining -- An Approach for Face Validity Assessment of Agent-Based Simulation Models through Outlier Detection with Process Mining -- Process Mining Insights to Process Improvement: Challenges and Recommendations -- Developing Taxonomies for Business Process Engineering -- Modeling in an Enterprise Context -- A Taxonomy for Platform Revenue Models: An Empirical-to-Conceptual Development Approach -- Conceptual Modeling in Support of Economic and Regulatory Viability Assessment - A Reality Check on the Example of Developing an Energy Community.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783031465864
    Additional Edition: Printed edition: ISBN 9783031465888
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages