• No results found

process-centric use-cases

Interactive client centric design management process for construction projects

Interactive client centric design management process for construction projects

... project use of ...case process or cases where pre- vailing process is ...Proposed use of Verstas-process is actually a co-creative collaboration process with ability to ...

8

The Role of Business Process Model in Customer Centric eGovernment System

The Role of Business Process Model in Customer Centric eGovernment System

... By process, we mean the business ...or cases and what to do at each situation or ...to process application forms but do not perform the required ...

11

Process Oriented Requirements Engineering: User Centric LORS Framework

Process Oriented Requirements Engineering: User Centric LORS Framework

... business process, the motivation of this research is the need to develop a coherent, structured, and complete framework for the definition of the as-is business ...business process modeling expertise has ...

34

Download
			
			
				Download PDF

Download Download PDF

... crafting use cases that will reposition DMPs as living documents useful for structuring the course of research activities and integrating with other systems and ...the use cases further ...

10

A Risk Assessment Method Based on Business Analysis in Information Security

A Risk Assessment Method Based on Business Analysis in Information Security

... business process-centric hierarchical correlation graph of assets by combing the assets, and then calculates the value of systemic risks using fuzzy cognitive ...

7

Big Data Use Cases

Big Data Use Cases

... where scientists globally can participate and deposit results of their experiment. We need to: a) Minimize challenges related to establishing re-usable, inter-disciplinary, scalable, on-demand, use-case and ...

133

Segment Routing Use Cases

Segment Routing Use Cases

... policies on how a given network component should be protected against failures. A typical case is the knowledge by an external controller (or through any other tool used by the operator) of shared risk among different ...

36

Task Based Design Knowledge Collaborative Filtering Recommendation and Its Application

Task Based Design Knowledge Collaborative Filtering Recommendation and Its Application

... (3) For executor U i of design task T k , knowledge from tasks that are similar to T k is used for recommendation. Given a threshold ε, knowledge set { , K 1  K m } consists of Documents and Design Cases of all ...

5

Detecting Exploit kits using Machine Learning

Detecting Exploit kits using Machine Learning

... The internet was originally developed when computers were huge and expensive. Only a few organizations, such as universities, business organizations and governments could afford them. We had a network of computers when ...

77

MANUFACTURING PERFORMANCE AND EVOLUTION OF TPM

MANUFACTURING PERFORMANCE AND EVOLUTION OF TPM

... many cases sufficient time cannot be secured for the purpose of education at one time and also operators can acquire such learning practicing ...extensive use of visual ...

13

Due Process in Summary Contempt Cases

Due Process in Summary Contempt Cases

... But in cases involving secrecy that method is not very satisfactory." Here the statute made certain acts punishable as contempt, and the Michigan Supreme Court, having declared one-man g[r] ...

6

Due Process of Law in Criminal Cases

Due Process of Law in Criminal Cases

... The Supreme Court held: "[WIhere, as here, the investigation is no longer a general inquiry into an unsolved crime but has begun to focus on a particular suspect, the suspect has been ta[r] ...

7

Improving Process in Virginia Capital Cases

Improving Process in Virginia Capital Cases

... Recently, United States Senator Patrick Leahy (D-Vt.) introduced the Innocence Protection Act that would force states to provide ways for inmates to introduce new evidence,[r] ...

25

Enabling Support of Collaborative Cross-enterprise Business Processes for Legacy ERP Systems

Enabling Support of Collaborative Cross-enterprise Business Processes for Legacy ERP Systems

... partners use Enterprise Resource Planning (ERP) system of the same ...explicit process awareness in the ERP system to support flow of activities in the cross- enterprise ...

18

From Secure Business Process Models to Secure Artifact-Centric Specifications

From Secure Business Process Models to Secure Artifact-Centric Specifications

... Limitations of implementing “security-by-design”: While our framework is designed with “security-by-design” in mind, due to technical and fundamental limitations, it can- not be fully achieved. First, there are security ...

16

Big Data Use Cases and Requirements

Big Data Use Cases and Requirements

... various use cases from diversified application domains and extracting ...a use case template with 26 fields, and these were completed for 51 ...important cases; but they form an interesting ...

8

Refining Use/Misuse/Mitigation Use Cases for Security Requirements

Refining Use/Misuse/Mitigation Use Cases for Security Requirements

... misuse cases to the use cases by comparing these threats (Table 3) to the known threats from the “U-1” textual ...misuse cases threaten exactly which use ...to use these ...

14

Use Cases of the ESO Telescope Bibliography

Use Cases of the ESO Telescope Bibliography

... Abstract. ESO’s mission is to enable front-line research in astrophysics by operating and maintaining a wide range of world-class telescopes and state-of-the-art instruments. Var- ious key performance indicators are used ...

8

Scripting Deployment of NIST Use Cases

Scripting Deployment of NIST Use Cases

... We also notice that scientific python packages are commonly used to enable numerical computation, data analysis and visual- ization for these big data applications (Figure 6), whereas there are dependent packages for ...

12

Big Data Use Cases and Requirements

Big Data Use Cases and Requirements

... 2 The focus is to form a community of interest from industry, academia, and government, with the goal of developing a consensus list of Big Data requirements across all stakeholders. This includes gathering and ...

21

Show all 10000 documents...

Related subjects