


default search action
11th ICEIS 2009: Milan, Italy
- José Cordeiro, Joaquim Filipe:

ICEIS 2009 - Proceedings of the 11th International Conference on Enterprise Information Systems, Volume ISAS, Milan, Italy, May 6-10, 2009. 2009, ISBN 978-989-8111-86-9
Invited Speakers
Keynote Lectures
- Peter Géczy:

Human Behavior and Interactions in Web Environments. ICEIS (1) 2009: 5-6 - Masao J. Matsumoto:

Service Computing EIS, World Panic and our Role Change. ICEIS (1) 2009: 7-15 - Michele Missikoff:

Let's Semanticise the World!!...or not?? ICEIS (1) 2009: 17-24 - Barbara Pernici:

Design of Adaptive Web Services. ICEIS (1) 2009: 25 - Jianchang Mao:

Machine Learning in Online Advertising. ICEIS (1) 2009: 27 - Ernesto Damiani:

Risk-aware Collaborative Processes. ICEIS (1) 2009: 29 - Mike P. Papazoglou:

Foresight & Research Priorities for Service Oriented Computing. ICEIS (1) 2009: 31
Information Systems Analysis and Specification
Short Papers
- Linda L. Zhang, Brian Rodrigues:

A Petri Net Model of Process Platform-based Production Configuration. ICEIS (3) 2009: 5-12 - Weilin Li, Young B. Moon:

A Simulation Model for Managing Engineering Changes Along with New Product Development. ICEIS (3) 2009: 13-18 - Ali Sunyaev, Alexander Kaletsch, Christian Mauro, Helmut Krcmar:

Security Analysis of the German Electronic Health Card's Peripheral Parts. ICEIS (3) 2009: 19-26 - Rita Suzana Pitangueira Maciel, Bruno Carreiro da Silva, Ana Patrícia Fontes Magalhães, Nelson Souto Rosa:

An Approach to Model-driven Development Process Specification. ICEIS (3) 2009: 27-32 - Christos Tatsiopoulos, Basilis Boutsinas:

Ontology Mapping based on Association Rule Mining. ICEIS (3) 2009: 33-40 - Stefan Biffl, Christoph Ferstl, Christian Höllwieser, Thomas Moser:

Evaluation of Case Tool Methods and Processes - An Analysis of Eight Open-source CASE Tools. ICEIS (3) 2009: 41-48 - Álvaro Armenteros, Antonio Muñoz, Antonio Maña, Daniel Serrano:

Security and Dependability in Ambient Intelligence Scenarios - The Communication Prototype. ICEIS (3) 2009: 49-56 - Gleison Samuel do Nascimento, Cirano Iochpe, Lucinéia Heloisa Thom, Manfred Reichert:

A Method for Rewriting Legacy Systems using Business Process Management Technology. ICEIS (3) 2009: 57-62 - Rodolfo Ferrini, Elisa Bertino:

A Comprehensive Approach for Solving Policy Heterogeneity. ICEIS (3) 2009: 63-68 - Stephan Haslinger, Miguel Jiménez, Schahram Dustdar:

Correlation of Context Information for Mobile Services. ICEIS (3) 2009: 69-76 - Mohammed Belkhatir, Shalini Bala, Noureddine Belkhatir:

Business Process Re-engineering in Supply Chains Examining the Case of the Expanding Halal Industry. ICEIS (3) 2009: 77-82 - Jean Michel Lau, Cirano Iochpe, Lucinéia Heloisa Thom, Manfred Reichert:

Discovery and Analysis of Activity Pattern Co-occurrences in Business Process Models. ICEIS (3) 2009: 83-88 - Volker Gruhn, André Köhler:

Modelling, Analysis and Improvement of Mobile Business Processes with the MPL Method. ICEIS (3) 2009: 89-94 - Christoph Goebel, Christoph Tribowski, Oliver Günther, Ralph Tröger, Roland Nickerl:

RFID in the Supply Chain: How to Obtain a Positive ROI - The Case of Gerry Weber. ICEIS (3) 2009: 95-102 - Deniss Kumlander:

Uncertainties Management Framework - Foundational Principles. ICEIS (3) 2009: 103-108 - Essam Mansour, Hagen Höpfner:

A Rule-based Approach and Framework for Managing Best Practices - An XML-based Management using Pure Database System Utilities. ICEIS (3) 2009: 109-115 - Kenji Ohmori, Tosiyasu L. Kunii:

Enterprise System Development with Invariant Preserving - A Mathematical Approach by the Homotopy Lifting and Extension Properties. ICEIS (3) 2009: 116-123 - Pedro Reales Mateo, Macario Polo, Beatriz Pérez Lamancha:

Automatic Generation of Test Cases in Software Product Lines. ICEIS (3) 2009: 124-130 - Sybren de Kinderen, Jaap Gordijn, Hans Akkermans:

Reasoning about Customer Needs in Multi-supplier ICT Service Bundles using Decision Models. ICEIS (3) 2009: 131-136 - Kamel Barkaoui, Chafia Bouanaka, José Martín Molina Espinosa:

An Event Structure based Coordination Model for Collaborative Sessions. ICEIS (3) 2009: 137-143 - Razvan Petrusel:

Mining and Modeling Decision Workflows from DSS User Activity Logs. ICEIS (3) 2009: 144-149 - Janis Grabis, Marite Kirikova, Janis Vanags:

Information Architecture of Fractal Information Systems. ICEIS (3) 2009: 150-155 - Adriana Leite, Rosario Girardi:

A Process for Multi-agent Domain and Application Engineering - The Domain Analysis and Application Requirements Engineering Phases. ICEIS (3) 2009: 156-161 - Pieter Joubert, Stefanie Louw, Carina de Villiers, Jan H. Kroeze:

A Revised Modelling Quality Framework. ICEIS (3) 2009: 162-167 - Samia Oussena, Balbir S. Barn:

Layered Process Models - Analysis and Implementation (using MDA Principles). ICEIS (3) 2009: 168-175 - Sergio Pozo Hidalgo, Rafael M. Gasca, Francisco Fernando de la Rosa Troyano:

Efficient Data Structures for Local Inconsistency Detection in Firewall ACL Updates. ICEIS (3) 2009: 176-181 - Zhaoxia Wang, Jianmin Wang, Lijie Wen, Yingbo Liu:

Deriving Canonical Business Object Operation Nets from Process Models. ICEIS (3) 2009: 182-187 - Nick R. T. P. van Beest, Nicolae B. Szirbik, Johan C. Wortmann:

A Vision for Agile Model-driven Enterprise Information Systems. ICEIS (3) 2009: 188-193 - Michael Edward Edge, Pedro R. Falcone Sampaio, Oliver Philpott, Mohammed Choudhary:

Specifying and Compiling High Level Financial Fraud Policies into StreamSQL. ICEIS (3) 2009: 194-199 - Jenny Lundberg, Rune Gustavsson:

Robust Approach Towards Context Dependant Information Sharing in Distributed Environments. ICEIS (3) 2009: 200-205 - Alessandro Ciaramella, Mario G. C. A. Cimino, Beatrice Lazzerini, Francesco Marcelloni:

Using BPMN and Tracing for Rapid Business Process Prototyping Environments. ICEIS (3) 2009: 206-212 - Joseph Barjis:

Information Systems Security based on Business Process Modeling. ICEIS (3) 2009: 213-218 - David Hästbacka, Seppo Kuikka:

A Service Oriented Engineering Approach to Enhance the Development of Automation and Control Systems. ICEIS (3) 2009: 219-224 - Edgar Sarmiento, Marcos R. S. Borges, Maria Luiza Machado Campos:

Applying an Event-based Approach for Detecting Requirements Interaction. ICEIS (3) 2009: 225-230 - Rodrigo Santos de Espindola, Jorge Luis Nicolas Audy:

An Evolutionary Approach for Quality Models Integration. ICEIS (3) 2009: 231-236 - Carla Sofia Pereira, Cristóvão Sousa, António Lucas Soares:

A Socio-semantic Approach to the Conceptualisation of Domains, Processes and Tasks in Large Projects. ICEIS (3) 2009: 237-242 - Leonardo Guerreiro Azevedo, Sean W. M. Siqueira, Fernanda Araújo Baião, Jairo de Souza, Mauro Lopes, Claudia Cappelli, Flávia Maria Santoro:

Enterprise Ontology Management - An Approach based on Information Architecture. ICEIS (3) 2009: 243-248 - Han G. Woo:

Finding Reusable Business Process Models based on Structural Matching. ICEIS (3) 2009: 249-255 - Peter Killisperger, Georg Peters, Markus Stumptner, Thomas Stückl:

Method Manual based Process Generation and Validation. ICEIS (3) 2009: 256-261 - Mauro Lopes, Giancarlo Guizzardi, Fernanda Araújo Baião, Ricardo de Almeida Falbo:

Reverse Engineering a Domain Ontology to Uncover Fundamental Ontological Distinctions - An Industrial Case Study in the Domain of Oil and Gas Production and Exploration. ICEIS (3) 2009: 262-267 - Li Peng:

A BPMN based Secure Workflow Model. ICEIS (3) 2009: 268-272 - Pedro Azevedo Rocha, Ângela Lacerda Nobre:

Semiotics - An Asset for Understanding Information Systems Communication. ICEIS (3) 2009: 273-278 - Yaël Champclaux, Taoufiq Dkaki, Josiane Mothe:

Enhancing High Precision by Combining Okapi BM25 with Structural Similarity in an Information Retrieval System. ICEIS (3) 2009: 279-285 - Ivan Markovic, Florian Hasibether:

Towards Integrating Perspectives and Abstraction Levels in Business Process Modeling. ICEIS (3) 2009: 286-291 - Juliana Jansen Ferreira, Victor Manaia Chaves, Renata Mendes de Araujo, Fernanda Araújo Baião:

Keeping the Rationale of IS Requirements using Organizational Business Models. ICEIS (3) 2009: 292-297 - Nadja Damij:

An Effective Process Modelling Technique. ICEIS (3) 2009: 298-303
Posters
- Masahiro Aruga, Shinwu Liu, Shuichi Kato:

A Kind of Information Content Applied for the Handicapped and Dementia Situation Considering Philosophical Elements. ICEIS (3) 2009: 307-312 - Michel dos Santos Soares, Jos L. M. Vrancken:

Evaluation of UML in Practice - Experiences in a Traffic Management Systems Company. ICEIS (3) 2009: 313-319 - Thomas Neubauer:

A Comparison of Security Safeguard Selection Methods. ICEIS (3) 2009: 320-323 - Mikaël Ates, Jacques Fayolle, Christophe Gravier, Jérémy Lardon, Rahul Garg:

Privacy for RFID-enabled Distributed Applications - Design Notes. ICEIS (3) 2009: 324-328 - Mikio Ohki, Haruki Murase:

Brain Physiological Characteristic Analysis for Software Analysis Support Environments. ICEIS (3) 2009: 329-337 - Ella E. Roubtsova, Lex Wedemeijer, Karel Lemmen, Ashley T. McNeile:

Modular Behaviour Modelling of Service Providing Business Processes. ICEIS (3) 2009: 338-341 - Diego Abbo, Lily Sun:

The Patterns for Information System Security. ICEIS (3) 2009: 342-346 - Fernanda M. R. Alencar, Oscar Pastor, Beatriz Marín, Giovanni Giachetti, Jaelson Castro:

Aligning Goal-Oriented Requirements Engineering and Model-Driven Development. ICEIS (3) 2009: 347-350 - António Pedro Rodrigues, João Araújo:

VAODA - A Viewpoint and Aspect-Oriented Domain Analysis Approach. ICEIS (3) 2009: 351-354 - Maria Carmen Aranda-Garrido, Nicolás Marín, Olga Pons:

Towards a Unified Domain for Fuzzy Temporal Databases. ICEIS (3) 2009: 355-358 - Tomás Martínez-Ruiz, Félix García, Mario Piattini:

Process Institutionalization using Software Process Lines. ICEIS (3) 2009: 359-362 - Thais Ebling, Jorge Luis Nicolas Audy, Rafael Prikladnicki:

A Systematic Literature Review of Requirements Engineering in Distributed Software Development Environments. ICEIS (3) 2009: 363-366 - María A. Pérez, Kenyer Domínguez, Edumilis Maria Méndez, Luis Eduardo Mendoza:

Applicability of ISO/IEC 9126 for the Selection of Floss Tools. ICEIS (3) 2009: 367-371 - Yuan Lin, Thérèse Libourel, Isabelle Mougenot:

A Workflow Language for the Experimental Sciences. ICEIS (3) 2009: 372-375 - Esraa Omran, Albert Bokma, Shereef Abu Al-Maati:

Using Ontologies with Hippocratic Databases - A Model for Protecting Personal Information Privacy. ICEIS (3) 2009: 376-382 - Matthias Goeken, Jan C. Pfeiffer, Wolfgang Johannsen:

Linking IT and Business Processes for Alignment - A Meta Model based Approach. ICEIS (3) 2009: 383-388 - Andrea Catalano, Matteo Magnani, Danilo Montesi:

Modeling with BPMN and Chorda: A Top-Down, Data-Driven Methodology and Tool. ICEIS (3) 2009: 389-392 - Joon S. Park, Jaeho Yim, Jason Hallahan:

Proactive Insider-threat Detection - Against Confidentiality in Sensitive Pervasive Applications. ICEIS (3) 2009: 393-398 - Guenter Pirklbauer, Rudolf Ramler, Rene Zeilinger:

An Integration-oriented Model for Application Lifecycle Management. ICEIS (3) 2009: 399-402 - Mariam Dibo, Noureddine Belkhatir:

Challenges and Perspectives in the Deployment of Distributed Components-based Software. ICEIS (3) 2009: 403-406 - Filipe Mota Pinto, Alzira Ascensão Marques, Manuel Filipe Santos:

Database Marketing Process Supported by Ontologies - System Architecture Proposal. ICEIS (3) 2009: 407-410 - Qianhui Liang, Weihui Dai:

On Technology Innovation - A Community Succession Model for Software Enterprise. ICEIS (3) 2009: 411-415 - Ana Oliveira, Matias Urbieta, João Araújo, Armanda Rodrigues, Ana Moreira, Silvia E. Gordillo, Gustavo Rossi:

Modelling Location-aware Behaviour in Web-GIS using Aspects. ICEIS (3) 2009: 416-419 - Marco Marcellis, Ella E. Roubtsova, Bert Hoogveld:

Instructional Design for Java Enterprise Component Technology. ICEIS (3) 2009: 420-422 - Kerstin Ådahl, Jenny Lundberg, Rune Gustavsson:

Innovative Health Care Channels - Towards Declarative Electronic Decision Support Systems Focusing on Patient Security. ICEIS (3) 2009: 423-426

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














