Automated workplace design and reconfiguration for evolving business processes
CASCON '05 Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research
Supporting Change Impact Analysis for Service Oriented Business Applications
SDSOA '07 Proceedings of the International Workshop on Systems Development in SOA Environments
Improving the Usability of E-Commerce Applications using Business Processes
IEEE Transactions on Software Engineering
A business process explorer: recovering and visualizing e-commerce business processes
Proceedings of the 30th international conference on Software engineering
Automatic steering of behavioral model inference
Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering
Towards framework definition to obtain secure business process from legacy information systems
Proceedings of the first international workshop on Model driven service engineering and data quality and security
Recovering business processes from business applications
Journal of Software Maintenance and Evolution: Research and Practice
Mining program workflow from interleaved traces
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Implementing business process recovery patterns through QVT transformations
ICMT'10 Proceedings of the Third international conference on Theory and practice of model transformations
Knowledge Discovery Metamodel-ISO/IEC 19506: A standard to modernize legacy systems
Computer Standards & Interfaces
A family of case studies on business process mining using MARBLE
Journal of Systems and Software
A case study on business process recovery using an e-government system
Software—Practice & Experience
A model driven reverse engineering framework for extracting business rules out of a java application
RuleML'12 Proceedings of the 6th international conference on Rules on the Web: research and applications
Hi-index | 0.00 |
The tutorial will cover techniques, tools, and research issues in analyzing computer viruses. It will provide participants the background needed to initiate research in reverse engineering computer viruses.