Zobrazeno 1 - 10
of 102
pro vyhledávání: '"Nezhad, H.R."'
Autor:
Sadeghi, Babak, Garmaroudi, Farshid S., Hashemi, M., Nezhad, H.R., Nasrollahi, A., Ardalan, Sima, Ardalan, Sahar
Publikováno v:
In Advanced Powder Technology 2012 23(1):22-26
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
van der Aa, J.H., Leopold, H., Reijers, H.A., Motahari-Nezhad, H.R., Recker, J., Weidlich, M.
Publikováno v:
van der Aa, J H, Leopold, H & Reijers, H A 2015, Detecting Inconsistencies between Process Models and Textual Descriptions . in Business Process Management (13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015) . Springer, Berlin, pp. 90-105, Business Process Management, 1/01/15 . https://doi.org/10.1007/978-3-319-23063-4_6
Business Process Management: 13th International Conference, BPM 2015, Innsbruck, Austria, August 31--September 3, 2015, Proceedings, 90-105
STARTPAGE=90;ENDPAGE=105;TITLE=Business Process Management
Business Process Management (13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015), 90-105
STARTPAGE=90;ENDPAGE=105;TITLE=Business Process Management (13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015)
Lecture Notes in Computer Science ISBN: 9783319230627
BPM
Business Process Management: 13th International Conference, BPM 2015, Innsbruck, Austria, August 31--September 3, 2015, Proceedings, 90-105
STARTPAGE=90;ENDPAGE=105;TITLE=Business Process Management
Business Process Management (13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015), 90-105
STARTPAGE=90;ENDPAGE=105;TITLE=Business Process Management (13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015)
Lecture Notes in Computer Science ISBN: 9783319230627
BPM
Text-based and model-based process descriptions have their own particular strengths and, as such, appeal to different stakeholders. For this reason, it is not unusual to find within an organization descriptions of the same business processes in both
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fd985304a15a921062600a00c86dffd9
https://research.tue.nl/en/publications/907f4227-8808-4794-a05e-737bfb438c87
https://research.tue.nl/en/publications/907f4227-8808-4794-a05e-737bfb438c87
Autor:
Vanwersch, R.J.B., Vanderfeesten, I.T.P., Rietzschel, E.F., Reijers, H.A., Motahari-Nezhad, H.R., Recker, J., Weidlich, M.
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319230627
BPM
Business Process Management (13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015), 3-18
STARTPAGE=3;ENDPAGE=18;TITLE=Business Process Management (13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015)
BPM
Business Process Management (13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015), 3-18
STARTPAGE=3;ENDPAGE=18;TITLE=Business Process Management (13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015)
As part of process redesign initiatives, substantial time is spent on the systematic description and analysis of the as-is process. By contrast, to-be scenarios are often generated in a less rigorous way. Only one or a few workshops are organized for
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9c4936df180b9a9992af3f196782a3ed
https://doi.org/10.1007/978-3-319-23063-4_1
https://doi.org/10.1007/978-3-319-23063-4_1
Autor:
Schunselaar, D.M.M., Verbeek, H.M.W., Reijers, H.A., Aalst, van der, W.M.P., Motahari-Nezhad, H.R., Recker, J., Weidlich, M.
Publikováno v:
Business Process Management (13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015), 180-188
STARTPAGE=180;ENDPAGE=188;TITLE=Business Process Management (13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015)
Lecture Notes in Computer Science ISBN: 9783319230627
BPM
STARTPAGE=180;ENDPAGE=188;TITLE=Business Process Management (13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015)
Lecture Notes in Computer Science ISBN: 9783319230627
BPM
An improvement or redesign of a process often starts by modifying the model supporting the process. Analysis techniques, like simulation, can be used to evaluate alternatives. However, even a small number of design choices may lead to an explosion of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5a511283d886db7685edc3dd31c504c0
https://research.tue.nl/en/publications/dd788bd1-cc01-434f-8ee0-9f08dd92a5fe
https://research.tue.nl/en/publications/dd788bd1-cc01-434f-8ee0-9f08dd92a5fe
Autor:
Zelst, van, S.J., Dongen, van, B.F., van der Aalst, W.M.P., Motahari-Nezhad, H.R., Recker, J., Weidlich, M.
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319230627
BPM
Business Process Management: 13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015, Proceedings, 163-171
STARTPAGE=163;ENDPAGE=171;TITLE=Business Process Management
BPM
Business Process Management: 13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015, Proceedings, 163-171
STARTPAGE=163;ENDPAGE=171;TITLE=Business Process Management
The aim of process discovery is to discover a process model based on business process execution data, recorded in an event log. One of several existing process discovery techniques is the ILP-based process discovery algorithm. The algorithm is able t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::196c0e2141515714f4717412d525cd7d
https://doi.org/10.1007/978-3-319-23063-4_10
https://doi.org/10.1007/978-3-319-23063-4_10
Autor:
González-López de Murillas, E., van der Aalst, W.M.P., Reijers, H.A., Motahari-Nezhad, H.R., Recker, J., Weidlich, M.
Publikováno v:
Business Process Management (13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015), 367-385
STARTPAGE=367;ENDPAGE=385;TITLE=Business Process Management (13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015)
Lecture Notes in Computer Science ISBN: 9783319230627
BPM
STARTPAGE=367;ENDPAGE=385;TITLE=Business Process Management (13th International Conference, BPM 2015, Innsbruck, Austria, August 31-September 3, 2015)
Lecture Notes in Computer Science ISBN: 9783319230627
BPM
Process Mining techniques rely on the existence of event data. However, in many cases it is far from trivial to obtain such event data. Considerable efforts may need to be spent on making IT systems record historic data at all. But even if such recor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::95d27a6d2c3c88d2d6c0dc106e455dfe
https://research.tue.nl/en/publications/8533fa13-361a-42e0-82ff-8db9f4310525
https://research.tue.nl/en/publications/8533fa13-361a-42e0-82ff-8db9f4310525
Autor:
Azevedo, Carlos L.B., Iacob, Maria Eugenia, Andrade Almeida, João, van Sinderen, Marten J., Ferreira Pires, Luis, Guizzardi, G., Gasevic, D, Hatala, M., Motahari Nezhad, H.R., Reichert, M.U.
Publikováno v:
EDOC
Seventeenth IEEE International Enterprise Object Computing Conference, EDOC 2013, 39-48
STARTPAGE=39;ENDPAGE=48;TITLE=Seventeenth IEEE International Enterprise Object Computing Conference, EDOC 2013
Seventeenth IEEE International Enterprise Object Computing Conference, EDOC 2013, 39-48
STARTPAGE=39;ENDPAGE=48;TITLE=Seventeenth IEEE International Enterprise Object Computing Conference, EDOC 2013
The importance of capabilities and resources for portfolio management and business strategy has been recognized in the management literature and on a recent proposal to extend ArchiMate, which includes these concepts in order to improve ArchiMate’s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::882a7d7f491202e443ca50a252348c01
https://doi.org/10.1109/edoc.2013.14
https://doi.org/10.1109/edoc.2013.14
Autor:
Välja, Margus, Österlind, Magnus, Iacob, Maria Eugenia, van Sinderen, Marten J., Johnson, Pontus, Gasevic, D, Hatala, M., Motahari Nezhad, H.R., Reichert, M.U.
Publikováno v:
EDOC
17th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2013, 153-158
STARTPAGE=153;ENDPAGE=158;TITLE=17th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2013
17th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2013, 153-158
STARTPAGE=153;ENDPAGE=158;TITLE=17th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2013
In existing business model frameworks little attention is paid to a thorough understanding of the perceived customer value of a business’ offering as compared to competing offers. In this paper, we propose to use utility theory in combination with