標題: Titlebook: Enterprise Design, Operations, and Computing; 26th International C Jo?o Paulo A. Almeida,Dimka Karastoyanova,Claudeni Conference proceeding [打印本頁] 作者: FROM 時間: 2025-3-21 17:09
書目名稱Enterprise Design, Operations, and Computing影響因子(影響力)
書目名稱Enterprise Design, Operations, and Computing影響因子(影響力)學科排名
書目名稱Enterprise Design, Operations, and Computing網絡公開度
書目名稱Enterprise Design, Operations, and Computing網絡公開度學科排名
書目名稱Enterprise Design, Operations, and Computing被引頻次
書目名稱Enterprise Design, Operations, and Computing被引頻次學科排名
書目名稱Enterprise Design, Operations, and Computing年度引用
書目名稱Enterprise Design, Operations, and Computing年度引用學科排名
書目名稱Enterprise Design, Operations, and Computing讀者反饋
書目名稱Enterprise Design, Operations, and Computing讀者反饋學科排名
作者: BROOK 時間: 2025-3-21 20:34 作者: 暴發(fā)戶 時間: 2025-3-22 01:03
Security Ontologies: A Systematic Literature Reviewontologies relate to one another is challenging due to their structure, size, complexity, and level of expressiveness. Differences between ontologies can be found on both the ontological and linguistic levels, resulting in errors and inconsistencies (i.e., different concept hierarchies, types of con作者: 花束 時間: 2025-3-22 07:38
Model-Based Construction of?Enterprise Architecture Knowledge Graphs and cohesive representation of the enterprise, enabling communication, analysis, and decision making. With the increasing size of EA models, automated analysis becomes essential. However, advanced model analysis is neither incorporated in current EA methods like ArchiMate nor supported by existing 作者: anarchist 時間: 2025-3-22 09:47
Enterprise Architecture Management Support for Digital Transformation Projects in Very Large Enterpr) architecture. The enterprise architecture management (EAM) function is designed to support these transformation endeavors. As DT projects are increasingly customer- and partner-driven, business-oriented and based on innovative digital technologies, the requirements for the EAM function are expecte作者: 蒼白 時間: 2025-3-22 13:54 作者: 蒼白 時間: 2025-3-22 19:26 作者: Aggregate 時間: 2025-3-22 22:58 作者: Delude 時間: 2025-3-23 02:48
Next-Activity Prediction for?Non-stationary Processes with?Unseen Data Variabilitye, or the next activity. A process in this context represents a coordinated set of activities that are enacted by a process engine in a specific order. The underlying source of data for PPM are event logs (ex post) or event streams (runtime) emitted for each activity. Although plenty of methods have作者: PSA-velocity 時間: 2025-3-23 05:31 作者: RALES 時間: 2025-3-23 12:23 作者: CHIDE 時間: 2025-3-23 15:46 作者: Foment 時間: 2025-3-23 19:02
Shape Your Process: Discovering Declarative Business Processes from?Positive and?Negative Traces Takowever, only consider one set of examples to learn from, i.e., the log itself. Some recent works on declarative process discovery, instead, advocated the usefulness of taking into account two different sets of traces (a.k.a. positive and negative examples), with the goal of learning a set of constra作者: 皺痕 時間: 2025-3-23 22:46 作者: anaphylaxis 時間: 2025-3-24 03:36
0302-9743 h took place in Bozen-Bolzano, Italy, in October 2022. ..The 15 full papers included in this book were carefully reviewed and selected from 48 submissions. They were organized in topical sections as follows: enterprise security; enterprise architecture; business process modeling and monitoring; busi作者: GRIN 時間: 2025-3-24 08:03 作者: 開頭 時間: 2025-3-24 12:25 作者: Eulogy 時間: 2025-3-24 16:14
Ratification and Implementation,ext, Business Process Modeling and Notation (BPMN) and Decision Model and Notation (DMN) provide support to model, execute, and monitor IoT-driven business rules, but some challenges remain. This paper derives the challenges that emerge when modeling, executing, and monitoring IoT-driven business rules using BPMN 2.0 and DMN standards.作者: Kidnap 時間: 2025-3-24 19:45 作者: Phenothiazines 時間: 2025-3-25 02:06 作者: 懶惰民族 時間: 2025-3-25 06:18
Enterprise Architecture Management Support for Digital Transformation Projects in Very Large Enterprws, we identified 39 changed and new requirements and compared them with requirements presented in the literature. The findings present new and changed requirements for adapting the EAM function to better support DT projects and to structure them according to EAM domains.作者: 樹木心 時間: 2025-3-25 10:50
Modeling, Executing and?Monitoring IoT-Driven Business Rules with?BPMN and?DMN: Current Support and?ext, Business Process Modeling and Notation (BPMN) and Decision Model and Notation (DMN) provide support to model, execute, and monitor IoT-driven business rules, but some challenges remain. This paper derives the challenges that emerge when modeling, executing, and monitoring IoT-driven business rules using BPMN 2.0 and DMN standards.作者: 脆弱吧 時間: 2025-3-25 12:36 作者: Gratuitous 時間: 2025-3-25 19:18
Semi-automated Test Migration for?BPMN-Based Process-Driven Applicationsthe PDA and classifies their impact on previously defined tests. The classification indicates whether existing test code can be migrated automatically or whether a manual revision becomes necessary. During an AB/BA experiment, the concept and the developed prototype proved a more efficient test migration process and a higher test quality.作者: 壓倒性勝利 時間: 2025-3-25 20:21
Conference proceedings 2022 were organized in topical sections as follows: enterprise security; enterprise architecture; business process modeling and monitoring; business process mining and discovery; and process-driven applications. .作者: Working-Memory 時間: 2025-3-26 00:39 作者: PLAYS 時間: 2025-3-26 06:35 作者: 母豬 時間: 2025-3-26 09:28
Sense making in a fast-forward society,ining. We provide insights from expert interviewees, resulting in six recommendations that enhance existing methodologies. In doing so, we present concrete examples of how process mining analyses can support question formulation and refinement.作者: 泥瓦匠 時間: 2025-3-26 14:07 作者: 混亂生活 時間: 2025-3-26 20:53 作者: forecast 時間: 2025-3-26 21:28 作者: 顛簸下上 時間: 2025-3-27 02:47
978-3-031-17603-6The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: 充滿人 時間: 2025-3-27 07:57
Enterprise Design, Operations, and Computing978-3-031-17604-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 恩惠 時間: 2025-3-27 13:12
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/311446.jpg作者: 謙虛的人 時間: 2025-3-27 17:13 作者: 膽大 時間: 2025-3-27 21:12
https://doi.org/10.1007/978-3-030-51648-2ious work, we proposed a reference model that relies on the integrated consideration of two fragmented, but complementary, reference models: NISTIR 7628 and powerLang. To align these reference models, we rely on multi-level modeling, specifically on the Flexible Meta Modeling and Execution Language 作者: Dri727 時間: 2025-3-28 01:09 作者: forestry 時間: 2025-3-28 02:37
Toxicology of the Imidazole Derivatives, and cohesive representation of the enterprise, enabling communication, analysis, and decision making. With the increasing size of EA models, automated analysis becomes essential. However, advanced model analysis is neither incorporated in current EA methods like ArchiMate nor supported by existing 作者: Femish 時間: 2025-3-28 08:30 作者: Spangle 時間: 2025-3-28 11:47 作者: glisten 時間: 2025-3-28 16:55
Ratification and Implementation,ing, implementation, execution, monitoring, and analysis of business processes, IoT fosters the collection and exchange of data over the Internet. By enriching BPM solutions with real-world IoT data both process automation and process monitoring can be improved. Furthermore, IoT data can be utilized作者: 跟隨 時間: 2025-3-28 20:57
Coronal Sections of the Tree Shrew BrainModel and Notation (BPMN) via exception events. Event-data-driven analysis techniques using such process models, e.g., conformance checking, require converting the BPMN model into a formal process modeling representation, i.e., Petri nets. However, the existing transformation of BPMN models with exc作者: Foolproof 時間: 2025-3-28 23:00 作者: MILK 時間: 2025-3-29 04:09 作者: Salivary-Gland 時間: 2025-3-29 07:23
https://doi.org/10.1057/9781137352750world texts. In this paper we investigate the usage of pre-trained language models and in-context learning to address the problem of . as a way to exploit the power of deep learning approaches while relying on few annotated data. In particular, we investigate the usage of the native GPT-3 model and 作者: animated 時間: 2025-3-29 13:01 作者: fluffy 時間: 2025-3-29 19:39 作者: Onerous 時間: 2025-3-29 20:06
https://doi.org/10.1007/978-981-19-9143-1 Process-Driven Applications (PDA). When evolving PDAs, the affected test cases must be identified and co-evolved as well. In this process, affected test cases can be overlooked, misunderstandings may occur during communication between different roles involved, and implementation errors can arise. R作者: conjunctiva 時間: 2025-3-30 02:50 作者: 內疚 時間: 2025-3-30 05:41
Techniques of surgical treatment,erature review is to identify core concepts and relationships that are used to describe security issues. We further analyse and map these core concepts and relationships to five security standards (i.e., NIST SP 800-160, NIST SP 800-30 rev.1, NIST SP 800-27 rev.A, ISO/IEC 27001 and NISTIR 8053). As 作者: 兩棲動物 時間: 2025-3-30 10:36 作者: 名義上 時間: 2025-3-30 15:51 作者: PHONE 時間: 2025-3-30 18:44
Scientific Research as a Global Enterprise,non-stationary processes, i.e., the impact of unseen data variability in event streams on prediction models from a structural and behavioural point of view. Strategies and methods are proposed to incorporate unknown data variability and to update recurrent neural network based models continuously in作者: 創(chuàng)造性 時間: 2025-3-30 21:15
https://doi.org/10.1057/9781137352750t performs. They also highlight the challenge posed by control flow relations. Second, it provides a first set of lessons learned on how to interact with these kinds of models that can facilitate future investigations on this subject.作者: Exploit 時間: 2025-3-31 04:14
https://doi.org/10.1057/9780230374010ed patterns. Playing by the rules ensures that the resulting models are always sound and free-choice. Furthermore, the discovered models are not restricted to block structures and are thus more flexible. The approach has been implemented in Python and tested using various real-life event logs. The e作者: Magisterial 時間: 2025-3-31 06:24