From event streams to process models and back: Challenges and opportunities
The domains of complex event processing (CEP) and business process management (BPM)
have different origins but for many aspects draw on similar concepts. While specific …
have different origins but for many aspects draw on similar concepts. While specific …
A theory of contingent business process management
S Zelt, J Recker, T Schmiedel… - Business Process …, 2019 - emerald.com
Purpose Many researchers and practitioners suggest a contingent instead of a “one size fits
all” approach in business process management (BPM). The purpose of this paper is to offer …
all” approach in business process management (BPM). The purpose of this paper is to offer …
IoT meets BPM: a bidirectional communication architecture for IoT-aware process execution
Business processes are frequently executed within application systems that involve humans,
computer systems as well as objects of the Internet of Things (IoT). Nevertheless, the usage …
computer systems as well as objects of the Internet of Things (IoT). Nevertheless, the usage …
Standards‐based modeling and deployment of serverless function orchestrations using BPMN and TOSCA
Abstract Function‐as‐a‐Service (FaaS) is a cloud service model enabling to implement
serverless applications for a variety of use cases. These range from scheduled calls of …
serverless applications for a variety of use cases. These range from scheduled calls of …
A paradigm-shifting from domain-driven data mining frameworks to process-based domain-driven data mining-actionable knowledge discovery framework
The success of data mining learned rules highly depends on its actionability: how useful it is
to perform suitable actions in any real business environment. To improve rule actionability …
to perform suitable actions in any real business environment. To improve rule actionability …
A generic approach towards location-aware business process execution
Locally distributed processes include several process participants working on tasks at
different locations, eg, craftspeople working on construction sites. Compared to classical IT …
different locations, eg, craftspeople working on construction sites. Compared to classical IT …
X-tolerant signature analysis
S Mitra, SS Lumetta… - … International Conferce on …, 2004 - ieeexplore.ieee.org
Stochastic coding is used to design X-tolerant signature analyzers that can detect defective
chips even in the presence of unknown logic values (X's). These signature analyzers can be …
chips even in the presence of unknown logic values (X's). These signature analyzers can be …
An integrated architecture for iot-aware business process execution
Business processes are frequently executed within application systems that involve humans,
computer systems as well as objects of the Internet of Things (IoT). While several works are …
computer systems as well as objects of the Internet of Things (IoT). While several works are …
Context integration for smart workflows
M Wieland, P Kaczmarczyk… - 2008 sixth annual IEEE …, 2008 - ieeexplore.ieee.org
The usage of workflow technology to model and execute business processes is widespread
in many enterprises and within the software industry. With the growing maturity of sensors …
in many enterprises and within the software industry. With the growing maturity of sensors …
Enhancement of industrial monitoring systems by utilizing context awareness
AN Lee, JLM Lastra - 2013 IEEE International Multi …, 2013 - ieeexplore.ieee.org
Current industrial monitoring systems gather big amounts of data which are provided to plant
personnel for maintaining the proper function and desired production performance …
personnel for maintaining the proper function and desired production performance …