Business Process Requirement Engineering
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 9
Abstract
Requirement engineering is as an increasingly important discipline for supporting business process and workflow modeling, as these are designed to satisfy diverse customer needs, and increase the productivity of enterprise. Moreover, most customers hesitate to adopt a given product or service if the added value is not conformed to their desires. Dealing with customers, with a wide range ofperspective, within an enterprise, is very complex. These perspectives are grounded in differences in skills, responsibility, knowledge and expertise of stakeholders. This holds more in the domain of business processes and workflows where the satisfaction of the customers is the must if these enterprises wish to deal with the pressure of the network economy. Based on the requirement engineering, we present in this paper an integration of RE approach in the modeling of business process and workflows.
Authors and Affiliations
Atsa Etoundi Roger , Fouda Ndjodo Marcel , Atouba Christian Lopez
A Novel Session Based Dual Image Encoding and Hiding Technique Using DWT and Spread Spectrum
This work proposes a DWT based Steganographic technique. Cover image is decomposed into four sub bands using DWT. Two Encoded secret images are embedded within the HL and HH sub bands respectively. During embedding secre...
Efficient Block Truncation Coding
Block Truncation Coding (BTC) is one of the lossy image ompression techniques. The computational complexity involved in this method is very simple. In the proposed method, the feature of inter-pixel correlation is explo...
Segmentation Based Approach to Dynamic Page Construction from Search Engine Results
The results rendered by the search engines are mostly a linear snippet list. With the prolific increase in the dynamism of web pages there is a need for enhanced result lists from search engines in order to cope-up with...
Combining Speedup Techniques based on Landmarks and Containers
The Dijkstra’s algorithm [1] , which is applied in many real world problems like mobile routing, road maps, railway networks, etc,. is used to find the shortest path between source and destination. There are many techniq...
Generation of key for Session key Distribution Using Bio-Metrics
Biometric cryptosystem gives different methods in high secure applications. Cryptography is intended to ensure the secrecy and authenticity of message. Here we will consider symmetric key cryptography. For conventional e...