default search action
11th ICEIS 2009: Milan, Italy
- José Cordeiro, Joaquim Filipe:
ICEIS 2009 - Proceedings of the 11th International Conference on Enterprise Information Systems, Volume ISAS, Milan, Italy, May 6-10, 2009. 2009, ISBN 978-989-8111-86-9
Invited Speakers
Keynote Lectures
- Peter Géczy:
Human Behavior and Interactions in Web Environments. ICEIS (1) 2009: 5-6 - Masao J. Matsumoto:
Service Computing EIS, World Panic and our Role Change. ICEIS (1) 2009: 7-15 - Michele Missikoff:
Let's Semanticise the World!!...or not?? ICEIS (1) 2009: 17-24 - Barbara Pernici:
Design of Adaptive Web Services. ICEIS (1) 2009: 25 - Jianchang Mao:
Machine Learning in Online Advertising. ICEIS (1) 2009: 27 - Ernesto Damiani:
Risk-aware Collaborative Processes. ICEIS (1) 2009: 29 - Mike P. Papazoglou:
Foresight & Research Priorities for Service Oriented Computing. ICEIS (1) 2009: 31
Information Systems Analysis and Specification
Short Papers
- Linda L. Zhang, Brian Rodrigues:
A Petri Net Model of Process Platform-based Production Configuration. ICEIS (3) 2009: 5-12 - Weilin Li, Young B. Moon:
A Simulation Model for Managing Engineering Changes Along with New Product Development. ICEIS (3) 2009: 13-18 - Ali Sunyaev, Alexander Kaletsch, Christian Mauro, Helmut Krcmar:
Security Analysis of the German Electronic Health Card's Peripheral Parts. ICEIS (3) 2009: 19-26 - Rita Suzana Pitangueira Maciel, Bruno Carreiro da Silva, Ana Patrícia Fontes Magalhães, Nelson Souto Rosa:
An Approach to Model-driven Development Process Specification. ICEIS (3) 2009: 27-32 - Christos Tatsiopoulos, Basilis Boutsinas:
Ontology Mapping based on Association Rule Mining. ICEIS (3) 2009: 33-40 - Stefan Biffl, Christoph Ferstl, Christian Höllwieser, Thomas Moser:
Evaluation of Case Tool Methods and Processes - An Analysis of Eight Open-source CASE Tools. ICEIS (3) 2009: 41-48 - Álvaro Armenteros, Antonio Muñoz, Antonio Maña, Daniel Serrano:
Security and Dependability in Ambient Intelligence Scenarios - The Communication Prototype. ICEIS (3) 2009: 49-56 - Gleison Samuel do Nascimento, Cirano Iochpe, Lucinéia Heloisa Thom, Manfred Reichert:
A Method for Rewriting Legacy Systems using Business Process Management Technology. ICEIS (3) 2009: 57-62 - Rodolfo Ferrini, Elisa Bertino:
A Comprehensive Approach for Solving Policy Heterogeneity. ICEIS (3) 2009: 63-68 - Stephan Haslinger, Miguel Jiménez, Schahram Dustdar:
Correlation of Context Information for Mobile Services. ICEIS (3) 2009: 69-76 - Mohammed Belkhatir, Shalini Bala, Noureddine Belkhatir:
Business Process Re-engineering in Supply Chains Examining the Case of the Expanding Halal Industry. ICEIS (3) 2009: 77-82 - Jean Michel Lau, Cirano Iochpe, Lucinéia Heloisa Thom, Manfred Reichert:
Discovery and Analysis of Activity Pattern Co-occurrences in Business Process Models. ICEIS (3) 2009: 83-88 - Volker Gruhn, André Köhler:
Modelling, Analysis and Improvement of Mobile Business Processes with the MPL Method. ICEIS (3) 2009: 89-94 - Christoph Goebel, Christoph Tribowski, Oliver Günther, Ralph Tröger, Roland Nickerl:
RFID in the Supply Chain: How to Obtain a Positive ROI - The Case of Gerry Weber. ICEIS (3) 2009: 95-102 - Deniss Kumlander:
Uncertainties Management Framework - Foundational Principles. ICEIS (3) 2009: 103-108 - Essam Mansour, Hagen Höpfner:
A Rule-based Approach and Framework for Managing Best Practices - An XML-based Management using Pure Database System Utilities. ICEIS (3) 2009: 109-115 - Kenji Ohmori, Tosiyasu L. Kunii:
Enterprise System Development with Invariant Preserving - A Mathematical Approach by the Homotopy Lifting and Extension Properties. ICEIS (3) 2009: 116-123 - Pedro Reales Mateo, Macario Polo, Beatriz Pérez Lamancha:
Automatic Generation of Test Cases in Software Product Lines. ICEIS (3) 2009: 124-130 - Sybren de Kinderen, Jaap Gordijn, Hans Akkermans:
Reasoning about Customer Needs in Multi-supplier ICT Service Bundles using Decision Models. ICEIS (3) 2009: 131-136 - Kamel Barkaoui, Chafia Bouanaka, José Martín Molina Espinosa:
An Event Structure based Coordination Model for Collaborative Sessions. ICEIS (3) 2009: 137-143 - Razvan Petrusel:
Mining and Modeling Decision Workflows from DSS User Activity Logs. ICEIS (3) 2009: 144-149 - Janis Grabis, Marite Kirikova, Janis Vanags:
Information Architecture of Fractal Information Systems. ICEIS (3) 2009: 150-155 - Adriana Leite, Rosario Girardi:
A Process for Multi-agent Domain and Application Engineering - The Domain Analysis and Application Requirements Engineering Phases. ICEIS (3) 2009: 156-161 - Pieter Joubert, Stefanie Louw, Carina de Villiers, Jan H. Kroeze:
A Revised Modelling Quality Framework. ICEIS (3) 2009: 162-167 - Samia Oussena, Balbir S. Barn:
Layered Process Models - Analysis and Implementation (using MDA Principles). ICEIS (3) 2009: 168-175 - Sergio Pozo Hidalgo, Rafael M. Gasca, Fernando de la Rosa Troyano:
Efficient Data Structures for Local Inconsistency Detection in Firewall ACL Updates. ICEIS (3) 2009: 176-181 - Zhaoxia Wang, Jianmin Wang, Lijie Wen, Yingbo Liu:
Deriving Canonical Business Object Operation Nets from Process Models. ICEIS (3) 2009: 182-187 - N. R. T. P. van Beest, Nicolae B. Szirbik, Johan C. Wortmann:
A Vision for Agile Model-driven Enterprise Information Systems. ICEIS (3) 2009: 188-193 - Michael Edward Edge, Pedro R. Falcone Sampaio, Oliver Philpott, Mohammed Choudhary:
Specifying and Compiling High Level Financial Fraud Policies into StreamSQL. ICEIS (3) 2009: 194-199 - Jenny Lundberg, Rune Gustavsson:
Robust Approach Towards Context Dependant Information Sharing in Distributed Environments. ICEIS (3) 2009: 200-205 - Alessandro Ciaramella, Mario G. C. A. Cimino, Beatrice Lazzerini, Francesco Marcelloni:
Using BPMN and Tracing for Rapid Business Process Prototyping Environments. ICEIS (3) 2009: 206-212 - Joseph Barjis:
Information Systems Security based on Business Process Modeling. ICEIS (3) 2009: 213-218 - David Hästbacka, Seppo Kuikka:
A Service Oriented Engineering Approach to Enhance the Development of Automation and Control Systems. ICEIS (3) 2009: 219-224 - Edgar Sarmiento, Marcos R. S. Borges, Maria Luiza Machado Campos:
Applying an Event-based Approach for Detecting Requirements Interaction. ICEIS (3) 2009: 225-230 - Rodrigo Santos de Espindola, Jorge Luis Nicolas Audy:
An Evolutionary Approach for Quality Models Integration. ICEIS (3) 2009: 231-236 - Carla Sofia Pereira, Cristóvão Sousa, António Lucas Soares:
A Socio-semantic Approach to the Conceptualisation of Domains, Processes and Tasks in Large Projects. ICEIS (3) 2009: 237-242 - Leonardo Guerreiro Azevedo, Sean W. M. Siqueira, Fernanda Araújo Baião, Jairo de Souza, Mauro Lopes, Claudia Cappelli, Flávia Maria Santoro:
Enterprise Ontology Management - An Approach based on Information Architecture. ICEIS (3) 2009: 243-248 - Han G. Woo:
Finding Reusable Business Process Models based on Structural Matching. ICEIS (3) 2009: 249-255 - Peter Killisperger, Georg Peters, Markus Stumptner, Thomas Stückl:
Method Manual based Process Generation and Validation. ICEIS (3) 2009: 256-261 - Mauro Lopes, Giancarlo Guizzardi, Fernanda Araújo Baião, Ricardo de Almeida Falbo:
Reverse Engineering a Domain Ontology to Uncover Fundamental Ontological Distinctions - An Industrial Case Study in the Domain of Oil and Gas Production and Exploration. ICEIS (3) 2009: 262-267 - Li Peng:
A BPMN based Secure Workflow Model. ICEIS (3) 2009: 268-272 - Pedro Azevedo Rocha, Ângela Lacerda Nobre:
Semiotics - An Asset for Understanding Information Systems Communication. ICEIS (3) 2009: 273-278 - Yaël Champclaux, Taoufiq Dkaki, Josiane Mothe:
Enhancing High Precision by Combining Okapi BM25 with Structural Similarity in an Information Retrieval System. ICEIS (3) 2009: 279-285 - Ivan Markovic, Florian Hasibether:
Towards Integrating Perspectives and Abstraction Levels in Business Process Modeling. ICEIS (3) 2009: 286-291 - Juliana Jansen Ferreira, Victor Manaia Chaves, Renata Mendes de Araujo, Fernanda Araújo Baião:
Keeping the Rationale of IS Requirements using Organizational Business Models. ICEIS (3) 2009: 292-297 - Nadja Damij:
An Effective Process Modelling Technique. ICEIS (3) 2009: 298-303
Posters
- Masahiro Aruga, Shinwu Liu, Shuichi Kato:
A Kind of Information Content Applied for the Handicapped and Dementia Situation Considering Philosophical Elements. ICEIS (3) 2009: 307-312 - Michel dos Santos Soares, Jos L. M. Vrancken:
Evaluation of UML in Practice - Experiences in a Traffic Management Systems Company. ICEIS (3) 2009: 313-319 - Thomas Neubauer:
A Comparison of Security Safeguard Selection Methods. ICEIS (3) 2009: 320-323 - Mikaël Ates, Jacques Fayolle, Christophe Gravier, Jérémy Lardon, Rahul Garg:
Privacy for RFID-enabled Distributed Applications - Design Notes. ICEIS (3) 2009: 324-328 - Mikio Ohki, Haruki Murase:
Brain Physiological Characteristic Analysis for Software Analysis Support Environments. ICEIS (3) 2009: 329-337 - Ella E. Roubtsova, Lex Wedemeijer, Karel Lemmen, Ashley T. McNeile:
Modular Behaviour Modelling of Service Providing Business Processes. ICEIS (3) 2009: 338-341 - Diego Abbo, Lily Sun:
The Patterns for Information System Security. ICEIS (3) 2009: 342-346 - Fernanda M. R. Alencar, Oscar Pastor, Beatriz Marín, Giovanni Giachetti, Jaelson Castro:
Aligning Goal-Oriented Requirements Engineering and Model-Driven Development. ICEIS (3) 2009: 347-350 - António Pedro Rodrigues, João Araújo:
VAODA - A Viewpoint and Aspect-Oriented Domain Analysis Approach. ICEIS (3) 2009: 351-354 - Maria Carmen Aranda-Garrido, Nicolás Marín, Olga Pons:
Towards a Unified Domain for Fuzzy Temporal Databases. ICEIS (3) 2009: 355-358 - Tomás Martínez-Ruiz, Félix García, Mario Piattini:
Process Institutionalization using Software Process Lines. ICEIS (3) 2009: 359-362 - Thais Ebling, Jorge Luis Nicolas Audy, Rafael Prikladnicki:
A Systematic Literature Review of Requirements Engineering in Distributed Software Development Environments. ICEIS (3) 2009: 363-366 - María A. Pérez, Kenyer Domínguez, Edumilis Maria Méndez, Luis Eduardo Mendoza:
Applicability of ISO/IEC 9126 for the Selection of Floss Tools. ICEIS (3) 2009: 367-371 - Yuan Lin, Thérèse Libourel, Isabelle Mougenot:
A Workflow Language for the Experimental Sciences. ICEIS (3) 2009: 372-375 - Esraa Omran, Albert Bokma, Shereef Abu Al-Maati:
Using Ontologies with Hippocratic Databases - A Model for Protecting Personal Information Privacy. ICEIS (3) 2009: 376-382 - Matthias Goeken, Jan C. Pfeiffer, Wolfgang Johannsen:
Linking IT and Business Processes for Alignment - A Meta Model based Approach. ICEIS (3) 2009: 383-388 - Andrea Catalano, Matteo Magnani, Danilo Montesi:
Modeling with BPMN and Chorda: A Top-Down, Data-Driven Methodology and Tool. ICEIS (3) 2009: 389-392 - Joon S. Park, Jaeho Yim, Jason Hallahan:
Proactive Insider-threat Detection - Against Confidentiality in Sensitive Pervasive Applications. ICEIS (3) 2009: 393-398 - Guenter Pirklbauer, Rudolf Ramler, Rene Zeilinger:
An Integration-oriented Model for Application Lifecycle Management. ICEIS (3) 2009: 399-402 - Mariam Dibo, Noureddine Belkhatir:
Challenges and Perspectives in the Deployment of Distributed Components-based Software. ICEIS (3) 2009: 403-406 - Filipe Mota Pinto, Alzira Ascensão Marques, Manuel Filipe Santos:
Database Marketing Process Supported by Ontologies - System Architecture Proposal. ICEIS (3) 2009: 407-410 - Qianhui Liang, Weihui Dai:
On Technology Innovation - A Community Succession Model for Software Enterprise. ICEIS (3) 2009: 411-415 - Ana Oliveira, Matias Urbieta, João Araújo, Armanda Rodrigues, Ana Moreira, Silvia E. Gordillo, Gustavo Rossi:
Modelling Location-aware Behaviour in Web-GIS using Aspects. ICEIS (3) 2009: 416-419 - Marco Marcellis, Ella E. Roubtsova, Bert Hoogveld:
Instructional Design for Java Enterprise Component Technology. ICEIS (3) 2009: 420-422 - Kerstin Ådahl, Jenny Lundberg, Rune Gustavsson:
Innovative Health Care Channels - Towards Declarative Electronic Decision Support Systems Focusing on Patient Security. ICEIS (3) 2009: 423-426
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.