ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Enterprise Design, Operations, and Computing: 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3–7, 2022, Proceedings (Lecture Notes in Computer Science, 13585)

دانلود کتاب طراحی سازمانی، عملیات و محاسبات: بیست و ششمین کنفرانس بین المللی، EDOC 2022، Bozen-Bolzano، ایتالیا، 3 تا 7 اکتبر 2022، مجموعه مقالات (یادداشت های سخنرانی در علوم کامپیوتر، 13585)

Enterprise Design, Operations, and Computing: 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3–7, 2022, Proceedings (Lecture Notes in Computer Science, 13585)

مشخصات کتاب

Enterprise Design, Operations, and Computing: 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3–7, 2022, Proceedings (Lecture Notes in Computer Science, 13585)

ویرایش: [1st ed. 2022] 
نویسندگان: , , , , ,   
سری:  
ISBN (شابک) : 3031176030, 9783031176036 
ناشر: Springer 
سال نشر: 2022 
تعداد صفحات: 294
[283] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 19 Mb 

قیمت کتاب (تومان) : 43,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 2


در صورت تبدیل فایل کتاب Enterprise Design, Operations, and Computing: 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3–7, 2022, Proceedings (Lecture Notes in Computer Science, 13585) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب طراحی سازمانی، عملیات و محاسبات: بیست و ششمین کنفرانس بین المللی، EDOC 2022، Bozen-Bolzano، ایتالیا، 3 تا 7 اکتبر 2022، مجموعه مقالات (یادداشت های سخنرانی در علوم کامپیوتر، 13585) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب طراحی سازمانی، عملیات و محاسبات: بیست و ششمین کنفرانس بین المللی، EDOC 2022، Bozen-Bolzano، ایتالیا، 3 تا 7 اکتبر 2022، مجموعه مقالات (یادداشت های سخنرانی در علوم کامپیوتر، 13585)



این کتاب مجموعه مقالات بیست و ششمین کنفرانس بین‌المللی طراحی، عملیات و محاسبات سازمانی، EDOC 2022 است که در بوزن-بولزانو، ایتالیا، در اکتبر 2022 برگزار شد. /span>

15 مقاله کامل موجود در این کتاب با دقت بررسی و از بین 48 مقاله ارسالی انتخاب شدند. آنها در بخش های موضوعی به شرح زیر سازماندهی شدند: امنیت سازمانی. شرکت معماری؛ مدلسازی و نظارت بر فرآیندهای کسب و کار؛ استخراج و کشف فرآیند کسب و کار؛ و برنامه های کاربردی فرآیند محور




توضیحاتی درمورد کتاب به خارجی

This book constitutes the proceedings of the 26th International Conference on Enterprise Design, Operations, and Computing, EDOC 2022, which took place in Bozen-Bolzano, Italy, in October 2022.

The 15 full papers included in this book were carefully reviewed and selected from 48 submissions. They were organized in topical sections as follows: enterprise security; enterprise architecture; business process modeling and monitoring; business process mining and discovery; and process-driven applications.





فهرست مطالب

Preface
Organization
Keynote Speeches
	“We Are All Digital Now”: Platform Systems and Flow Processes in Modern Enterprises
	Smart Modeling of Smart Software
	Modelling Ethical and Legal Norms/Explaining Compliance and Violation
Tutorial
	Business Process Modeling and Simulation with DPMN
	Contents
Enterprise Security
Computable Consent – From Regulatory, Legislative, and Organizational Policies to Security Policies
	1 Introduction
		1.1 Problem and Contributions
		1.2 Related Work
	2 Towards Consent Automation – FHIR Approach
		2.1 FHIR Consent Resource – Basic Policy and Computable Policy Expressions
		2.2 Link with Smart on FHIR Architecture Pattern
		2.3 Analysis
	3 Computable Policy Framework
		3.1 Modelling Concepts for Policy Rules
		3.2 Policy Language Options
		3.3 Example – Privacy Consent
	4 Positioning with FHIR Ecosystem
	5 Conclusion and Future Work
	References
A Multi-level Cyber-Security Reference Model in Support of Vulnerability Analysis
	1 Introduction
	2 Main Goals, Requirements and Design Decisions
	3 A Multi-level Reference Model in Support of Vulnerability Analysis
	4 Demonstration
	5 Related Work
	6 Conclusions
	References
Security Ontologies: A Systematic Literature Review
	1 Introduction
	2 Background and Related Work
		2.1 Security Ontologies
		2.2 Existing Systematic Literature Review of Security Ontologies
	3 The Systematic Literature Review
		3.1 Planning the Systematic Literature Review
		3.2 Conducting the Systematic Literature Review
		3.3 Reporting the Systematic Literature Review
	4 Conclusions and Future Work
	References
Enterprise Architecture
Model-Based Construction of Enterprise Architecture Knowledge Graphs
	1 Introduction
	2 Background
		2.1 Enterprise Architecture Analysis
		2.2 Graph-Based Analysis of EA Models
		2.3 Knowledge Graphs and Enterprise Architecture
	3 Model-Based EA Knowledge Graph Construction
		3.1 Knowledge Graph Creation
		3.2 Knowledge Graph Enrichment
		3.3 Knowledge Graph Deployment and Application
	4 An EAKG Archi Plugin
	5 Case-Based Evaluation
	6 Conclusive Discussion
	References
Enterprise Architecture Management Support for Digital Transformation Projects in Very Large Enterprises: A Case Study at a European Mobility Provider
	1 Introduction
	2 Theoretical Foundations and Related Work
		2.1 Enterprise Architecture
		2.2 Digital Transformation
		2.3 Enterprise Architecture Support for DT Projects
	3 Research Approach
		3.1 Research Method
		3.2 Context of the Case Study
		3.3 Data Gathering: Qualitative Expert Interviews
		3.4 Data Analysis: Document Analysis and Qualitative Content Analysis of the Expert Interviews
	4 Results
	5 Discussion
	6 Conclusion
	References
Interoperability of Digital Government Services: A Brazilian Reference Architecture Model to Promote Communication, Management, and Reuse of Solutions
	1 Introduction
	2 Materials and Methods
		2.1 Environment: DT and the Brazilian Government Perspective
		2.2 Knowledge Base
		2.3 IS Research Cycle
	3 The Reference Model for Interoperability Between Entities in the Delivery of Electronic Government Services
		3.1 The Reference Model
		3.2 A Proposal for the Model Implementation
		3.3 Monitoring the Use and Evolving the Reference Model
	4 Conclusions
	References
Business Process Modeling and Monitoring
Modeling, Executing and Monitoring IoT-Driven Business Rules with BPMN and DMN: Current Support and Challenges
	1 Introduction
	2 Current Support for IoT-Driven Business Rules in BPMN and BPMN + DMN
		2.1 IoT-Driven Business Rules in BPMN
		2.2 IoT-Driven Business Rules in BPMN + DMN
	3 Challenges
		3.1 Modeling Challenges
		3.2 Execution Challenges
		3.3 Monitoring Challenges
	4 Conclusion
	References
Enhanced Transformation of BPMN Models with Cancellation Features
	1 Introduction
	2 Related Work
	3 Background
		3.1 Business Process Model and Notation
		3.2 Reset Nets
	4 Enhanced Transformation of BPMN Models
		4.1 Modeling Assumptions
		4.2 Building Reset Nets
	5 Evaluation
		5.1 Experimental Setup
		5.2 Results
		5.3 Threats to Validity
	6 Conclusion
	References
Next-Activity Prediction for Non-stationary Processes with Unseen Data Variability
	1 Introduction
	2 Related Work
	3 Challenges and Requirements
		3.1 Data Variability
		3.2 Challenges of Evidence Based Predictions with Unseen Activities and Sequences
		3.3 Uncertainty of the Final Activity of a Trace
	4 Approach
		4.1 Data Encoding with Unseen Data Variability
		4.2 Determining the Termination of a Sequence
		4.3 Online Prediction Process
		4.4 Prediction Model Update Strategies
	5 Experiments
		5.1 Online Prediction Simulation and Model Update
		5.2 Datasets
		5.3 Data Pre-processing
		5.4 Event Data Encoding
		5.5 LSTM Neural Networks and Model Training
		5.6 Model Selection
		5.7 Results
	6 Conclusion
	References
Business Process Mining and Discovery
On the Origin of Questions in Process Mining Projects
	1 Introduction
	2 Background
	3 Research Method
		3.1 Data Collection
		3.2 Data Analysis
	4 Results
		4.1 Question Formulation: From Event Logs to Questions
		4.2 Question Refinement: Refining Questions with Process Mining
	5 Discussion
	6 Conclusion
	References
Extracting Business Process Entities and Relations from Text Using Pre-trained Language Models and In-Context Learning
	1 Introduction
	2 Background
		2.1 Process Extraction from Text
		2.2 In-Context Learning
		2.3 The PET Dataset
	3 Process Extraction from Text via In-Context Learning
		3.1 Implementing the Approach
	4 Empirical Assessment
		4.1 The Tasks
		4.2 Experimental Setting
		4.3 Validation Dataset
		4.4 Answering the Research Questions
	5 Further Insights
	6 Related Work
	7 Conclusion
	References
Discovering Sound Free-Choice Workflow Nets with Non-block Structures
	1 Introduction
	2 Related Work
	3 Preliminaries
	4 Approach
		4.1 Ordering Strategies for Adding Activities
		4.2 Search Space Pruning
		4.3 Patterns
		4.4 Selection and Fall-Through
	5 Evaluation
		5.1 Experiment Setup
		5.2 Results
	6 Conclusion and Future Work
	References
Shape Your Process: Discovering Declarative Business Processes from Positive and Negative Traces Taking into Account User Preferences
	1 Introduction
	2 The Modeling Language
	3 Why Preferences on the Discovered Models?
		3.1 Preferences over Process Activities
		3.2 Preferences over Declare Templates
		3.3 Preferences over both Activities and Templates
	4 Discovering Business Processes from Positive and Negative Traces
	5 Adding Preferences to Process Discovery: An Implementation Through ASPrin
		5.1 Specifying the Preferences
		5.2 Exploiting ASPrin for Searching Preferred Models
	6 Evaluating the Discovery
		6.1 The DREYERS Log
		6.2 Evaluation on the CERV Log
	7 Related Work
	8 Conclusions
	References
Process-Driven Applications
Semi-automated Test Migration for BPMN-Based Process-Driven Applications
	1 Introduction
	2 No-Code Approach for Creating Regression Tests
	3 Related Work
	4 Overview of the Solution
	5 Flow Assignment
	6 Test Impact Analysis
		6.1 Impact Analysis at Flow Level
		6.2 Aggregation at Flow Level and Derivation at Test Level
	7 Migration and Test Code Generation
	8 Evaluation
		8.1 Experiment Setting
		8.2 Results and Discussion
	9 Summary and Outlook
	References
Splitting Quantum-Classical Scripts for the Generation of Quantum Workflows
	1 Introduction
	2 Fundamentals
		2.1 Hybrid Quantum Algorithms
		2.2 Quantum Workflows
		2.3 Deployment Models
	3 Script Splitting and Workflow Generation
		3.1 Select Implementation
		3.2 Add Splitting Markers
		3.3 Split Script
		3.4 Generate Quantum Workflow
		3.5 Generate Incomplete Deployment Models
		3.6 Complete Deployment Models
		3.7 Deploy and Execute
	4 Prototype
	5 Case Study: Shor's Algorithm
	6 Discussion
	7 Related Work
	8 Summary and Future Work
	References
Author Index




نظرات کاربران