A Detection Method for Abnormal Transactions in E‐Commerce Based on Extended Data Flow Conformance Checking
With the development of smart devices and mobile communication technologies, e‐
commerce has spread over all aspects of life. Abnormal transaction detection is important in …
commerce has spread over all aspects of life. Abnormal transaction detection is important in …
Defining and executing temporal constraints for evaluating engineering artifact compliance
Engineering processes for safety-critical systems describe the steps and sequence that
guide engineers from refining user requirements into executable code, as well as producing …
guide engineers from refining user requirements into executable code, as well as producing …
WICKR: A Joint Semantics for Flexible Processes and Data
S Haarmann - 2022 - publishup.uni-potsdam.de
Knowledge-intensive business processes are flexible and data-driven. Therefore, traditional
process modeling languages do not meet their requirements: These languages focus on …
process modeling languages do not meet their requirements: These languages focus on …
Checking regulatory compliance: Will we live to see it?
S Colombo Tosatto, G Governatori… - … Conference, BPM 2019 …, 2019 - Springer
Checking regulatory compliance of business processes prior to deployment is common
practice and numerous approaches have been developed over the last decade. However …
practice and numerous approaches have been developed over the last decade. However …
Analyzing and Predicting Verification of Data-Aware Process Models–A Case Study With Spectrum Auctions
E Ordoni, J Bach, AK Fleck - IEEE Access, 2022 - ieeexplore.ieee.org
Verification techniques play an essential role in detecting undesirable behaviors in many
applications like spectrum auctions. By verifying an auction design, one can detect the least …
applications like spectrum auctions. By verifying an auction design, one can detect the least …
Reduction of data-value-aware process models: A relevance-based approach
In many settings, verification of process models hinges on data values. A data value is a
value in the domain of a data object, eg, $1000 as the price of a product. Naive exploration …
value in the domain of a data object, eg, $1000 as the price of a product. Naive exploration …
Cross-case data objects in business processes: Semantics and analysis
S Haarmann, M Weske - … Process Management Forum: BPM Forum 2020 …, 2020 - Springer
Abstract Business Process Management (BPM) provides methods and techniques to design,
analyze, and enact business processes. An assumption in BPM has been that data objects …
analyze, and enact business processes. An assumption in BPM has been that data objects …
Formal framework for checking compliance of data-driven case management
Business processes are often specified in descriptive or normative models. Both types of
models should adhere to internal and external regulations, such as company guidelines or …
models should adhere to internal and external regulations, such as company guidelines or …
Scenario building and measurement of the business process maturity using fuzzy cognitive mapping technique: a case study in SAIPA company
MRS Moghaddam, A Safari, H Safari… - … Journal of Process …, 2023 - inderscienceonline.com
One of the current concerns of managers is to develop the business process maturity and
identify the conditions for improving the pertaining processes. This eventuates in increased …
identify the conditions for improving the pertaining processes. This eventuates in increased …
Results from the Verification of Models of Spectrum Auctions
The revenue gained by spectrum auctions has been an essential source of governmental
income. Even though numerous studies have been conducted in auction literature, many …
income. Even though numerous studies have been conducted in auction literature, many …