default search action
7th ICEIS 2005: Miami, Florida, USA
- Chin-Sheng Chen, Joaquim Filipe, Isabel Seruca, José Cordeiro:
ICEIS 2005, Proceedings of the Seventh International Conference on Enterprise Information Systems, Miami, USA, May 25-28, 2005. 2005, ISBN 972-8865-19-8
Volume 1 - Volume 2 - Volume 3 - Volume 4 - Volume 5
Volume III - Information Systems Analysis and Specification
Full Papers
- Rita Suzana Pitangueira Maciel, Bruno Carreiro da Silva, Carlos André Guimarães Ferraz, Nelson S. Rosa:
An MDA-EDOC Based Development Process for Distributed Applications. ICEIS (3) 2005: 3-10 - Alejandra Cechich, Mario Piattini:
Early Detection of Cots Functional Suitability for an E-Payment Case Study. ICEIS (3) 2005: 11-28 - Rajagopal Rajugan, Tharam S. Dillon, Elizabeth Chang, Ling Feng:
XML Views, Part III: An UML Based Design Methodology for XML Views. ICEIS (3) 2005: 19-28 - Shazia W. Sadiq, Maria E. Orlowska, Joe Y.-C. Lin, Wasim Sadiq:
Quality of Service in Flexible Workflows through Process Constraints. ICEIS (3) 2005: 29-37 - Sarita Bassil, Stefanie Rinderle, Rudolf K. Keller, Peter G. Kropf, Manfred Reichert:
Preserving the Context of Interrupted Business Process Activities. ICEIS (3) 2005: 38-45 - Jörg Becker, Christian Janiesch, Patrick Delfmann, Wolfgang Fuhr:
Perspectives on Process Documentation - a Case Study. ICEIS (3) 2005: 46-56 - Axel Martens:
Process Oriented Discovery of Business Partners. ICEIS (3) 2005: 57-64 - Manuel I. Capel, Juan Antonio Holgado Terriza:
Transforming SA/RT Graphical Specifications into CSP+T Formalism - Obtaining a Formal Specification from Semi-Formal SA/RT Essential Models. ICEIS (3) 2005: 65-72 - Liping Yang, Ying Liu, Xin Zhou:
A Theoretical Performance Analysis Method for Business Process Model. ICEIS (3) 2005: 73-80 - Manuel João Pereira, Luís Valadares Tavares, Raquel Soares:
Sustainable Development and Investment in Information Technologies: A Socio-Economic Analysis. ICEIS (3) 2005: 81-88 - Ying Liang:
Dialogue Act Modelling for Analysis and Specification of Web-Based Information Systems. ICEIS (3) 2005: 89-97 - Sabah S. Al-Fedaghi:
The "Right to be Let Alone" and Private Information. ICEIS (3) 2005: 98-107 - Jean-Louis Boulanger:
BRAIL - Safety Requirement Analysis. ICEIS (3) 2005: 108-111 - Carlos Alberto Cocozza Simoni, Maria Cecília Calani Baranauskas, Rodrigo Bonacin:
Bringing Social Constructs to the Information System Development Process: Contributions of Organizational Semiotics. ICEIS (3) 2005: 112-119 - Marcello Esposito, Claudio Mazzariello, Francesco Oliviero, Simon Pietro Romano, Carlo Sansone:
Real Time Detection of Novel Attacks by Means of Data Mining Techniques. ICEIS (3) 2005: 120-127 - Michael Hafner, Ruth Breu, Michael Breu:
A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together. ICEIS (3) 2005: 128-135 - Dianxiang Xu, Joshua J. Pauli:
Threat-Driven Architectural Design of Secure Information Systems. ICEIS (3) 2005: 136-143 - Fernando González:
Model Sharing in the Simulation and Control of Distributed Discrete-Event Systems. ICEIS (3) 2005: 144-151 - Bassem Nasser, Abdelmalek Benzekri, Romain Laborde, Frédéric Grasset, François Barrère:
Access Control Model for Grid Virtual Organizations. ICEIS (3) 2005: 152-158
Short Papers
- Tao Yu, Jun-Jang Jeng:
Model Driven Development of Business Process Monitoring and Control Systems. ICEIS (3) 2005: 161-166 - Vikas S. Shah:
Model Driven Architecture Based Real-Time Enterprise Information Integration - An Approach and Impact on Businesses. ICEIS (3) 2005: 167-173 - Faribors Ronaghi:
Integrated Performance Management. ICEIS (3) 2005: 174-178 - Prabir Nandi, Santhosh Kumaran:
Adaptive Business Objects - A new Component Model for Business Integration. ICEIS (3) 2005: 179-188 - Mohamed Hadj Kacem, Mohamed Jmaiel, Ahmed Hadj Kacem, Khalil Drira:
Evaluation and Comparison of ADL Based Approaches for the Description of Dynamic of Software Architectures. ICEIS (3) 2005: 189-195 - Jaesuk Ahn, Dung N. Lam, Thomas J. Graser, K. Suzanne Barber:
System Engineering Processes Activities for Agent System Design: Component Based Development for Rapid Prototyping. ICEIS (3) 2005: 196-202 - Fredrik Seehusen, Ketil Stølen:
Graphical Specification of Dynamic Network Structure. ICEIS (3) 2005: 203-210 - Ahmed Ghoneim, Sven Apel, Gunter Saake:
Evolutionary Software Life Cycle for Self-Adapting Software Systems. ICEIS (3) 2005: 211-216 - Bouchra El Asri, Mahmoud Nassar, Bernard Coulette, Abdelaziz Kriouile:
Multiviews Components for Information System Development. ICEIS (3) 2005: 217-225 - Alexandre Alvaro, Eduardo Santana de Almeida, Daniel Lucrédio, Antônio Francisco do Prado, Vinicius Cardoso Garcia, Silvio Romero de Lemos Meira:
Aspect IPM: Towards an Incremental Process Model Based on AOP for Component-Based Systems. ICEIS (3) 2005: 226-232 - Yves Callejas, Jean-Louis Cavarero, Martine Collard:
Conceptual Optimisation in Business Process Management. ICEIS (3) 2005: 233-239 - Simon Tan, Kecheng Liu:
Enterprise Infrastructure Planning - Modelling and Simulation Using the Problem Articulation Method. ICEIS (3) 2005: 240-245 - Haiping Xu, Xiaoqin Zhang:
A Methodology for Role-Based Modeling of Open Multi-Agent Software Systems. ICEIS (3) 2005: 246-253 - Jon Espen Ingvaldsen, Jon Atle Gulla, Ole Andreas Hegle, Atle Prange:
Revealing the Real Business Flows from Enterprise Systems Transactions. ICEIS (3) 2005: 254-259 - Karsten Klose, Ralf Knackstedt, Jörg Becker:
Process Modelling for Service Processes - Modelling Methods Extensions for Specifying and Analysing Customer Integration. ICEIS (3) 2005: 260-265 - Guido Menkhaus, Brigitte Andrich:
Metric Suite Directing the Failure Mode Analysis of Embedded Software Systems. ICEIS (3) 2005: 266-273 - Vinicius Cardoso Garcia, Daniel Lucrédio, Antônio Francisco do Prado, Eduardo Santana de Almeida, Alexandre Alvaro, Silvio Romero de Lemos Meira:
Towards an Approach for Aspect-Oriented Software Reengineering. ICEIS (3) 2005: 274-279 - Francisco Maciá Pérez, Virgilio Gilart-Iglesias, Diego Marcos-Jorquera, Juan Manuel García Chamizo, Antonio Hernández Sáez:
Decoupling MVC: J2EE Design Patterns Integration. ICEIS (3) 2005: 280-287 - Subhas C. Misra, Vinod Kumar, Uma Kumar:
Modeling Strategic Actor Relationships to Support Risk Analysis and Control in Software Projects. ICEIS (3) 2005: 288-293 - Michael Vonrueden, Thorsten Hampel:
Collaborative Ontologies and Its Visualisation in CSCW Systems. ICEIS (3) 2005: 294-299 - Baowen Xu, Peng Wang, Jianjiang Lu, Dazhou Kang, Yanhui Li:
A Framework for Managing Multiple Ontologies: The Function-Oriented Perspective. ICEIS (3) 2005: 300-305 - Thomas E. Koch, Esther M. Gelle, Patrick Sager:
Automating the Configuration of It Asset Management in Industrial Automation Systems. ICEIS (3) 2005: 306-311 - Abrar Haider, Andy Koronios:
ICT Based Asset Management Framework. ICEIS (3) 2005: 312-322 - Danilo Ardagna, Chiara Francalanci, Gianfranco Bazzigaluppi, Mauro Gatti, Francesco Silveri, Marco Trubian:
A Cost-Oriented Tool to Support Server Consolidation. ICEIS (3) 2005: 323-330 - Weiliang Zhao, Vijay Varadharajan, George Bryan:
Type and Scope of Trust Relationships in Collaborative Interactions in Distributed Environments. ICEIS (3) 2005: 331-336 - Kenneth Boness, Rachel Harrison, Kecheng Liu:
Acknowledging the Implications of Requirements. ICEIS (3) 2005: 337-342 - Paulo Sérgio Muniz Silva, Leonardo Chwif:
Functional and Non-Functional Application Software Requirements: Early Conflict Detection. ICEIS (3) 2005: 343-348 - Mike White, Brendan Jennings, Sven van der Meer:
User-Centric Adaptive Access Control and Resource Configuration for Ubiquitous Computing Environments. ICEIS (3) 2005: 349-354 - Ronda R. Henning:
Metapolicies and Context-Based Access Control. ICEIS (3) 2005: 355-359 - Hironobu Kuruma, Shinichi Honiden:
A Model for Policy Based Service Community. ICEIS (3) 2005: 360-366
Posters
- Donald R. Chand:
Piloting Software Engineering Institute's Software Process Improvement in Information Systems Groups. ICEIS (3) 2005: 369-372 - Boriana Rukanova, Mehmet N. Aydin, Kees van Slooten, Robert A. Stegwee:
Towards a Meta Model for Business Process Concepts. ICEIS (3) 2005: 373-377 - María José Escalona Cuaresma, Jean-Louis Cavarero:
Building Class Diagrams Systematically. ICEIS (3) 2005: 378-381 - Jing Ding, Daniel Berleant:
Design of a Standoff Object-Oriented Markup Language (sooml) for Annotating Biomedical Literature. ICEIS (3) 2005: 382-385 - Ioannis Ignatiadis, Konstantinos A. Tarabanis:
Specification of E-Commerce Systems Using the UMM Modelling Methodology. ICEIS (3) 2005: 386-389 - Anne De Vos, Claire Lobet-Maris, Anne Rousseau:
What Can Organizational Analysis Give to Requirement Analysis? Developing an Information System in Hospital Emergency Departments. ICEIS (3) 2005: 390-393 - Boris Shishkov, Jan L. G. Dietz:
Applying SDBC in the Cultural-Heritage Sector. ICEIS (3) 2005: 394-398 - Xin Peng, Wenyun Zhao, Yijian Wu, Yunjiao Xue:
Research on Support Tools for Object-Oriented Software Reengineering. ICEIS (3) 2005: 399-402 - Tim R. Norton:
Using a Workload Information Repository - Mapping Businesses and Applications to Servers and Processes. ICEIS (3) 2005: 403-408 - Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Rieks Joosten, Geert Kleinhuis:
Service Brokerage in Prolog. ICEIS (3) 2005: 409-412 - Eva Blomqvist, Kurt Sandkuhl:
Patterns in Ontology Engineering: Classification of Ontology Patterns. ICEIS (3) 2005: 413-416 - Boris Shishkov, Jan L. G. Dietz:
Applying Component-Based UML-Driven Conceptual Modeling in SDBC. ICEIS (3) 2005: 417-420 - Naibin Li:
Verification and Validation of the Real Time System in the Radar Sensor. ICEIS (3) 2005: 421-424 - Niansheng Liu, Donghui Guo:
A New Public-Key Encryption Scheme Based on Neural Networks and Its Security Analysis. ICEIS (3) 2005: 425-428 - Dan Song, Keqing He, Peng Liang, Wudong Liu:
A Formal Language for Model Transformation Specification. ICEIS (3) 2005: 429-433 - Holly Parsons-Hann, Kecheng Liu:
Measuring Requirements Complexity to Increase the Probability of Project Success. ICEIS (3) 2005: 434-438 - Guofu Zhou, Yanxiang He, Zhuomin Du:
Description of Workflow Patterns Based on P/T Nets. ICEIS (3) 2005: 439-442 - Anne Yun-An Chen, Dennis McLeod:
Semantic-Based Similarity Decisions for Ontologies. ICEIS (3) 2005: 443-446 - Subhas C. Misra, Vinod Kumar, Uma Kumar:
A Strategic Modeling Technique for Change Management in Organizations Undergoing BPR. ICEIS (3) 2005: 447-450 - Aaron Jackson, John G. Keating:
A Non Proprietary Framework for Policy Controlled Management of the Model in the MVC Design Paradigm. ICEIS (3) 2005: 451-454 - Claudia-Melania Chituc, Américo Lopes Azevedo:
Towards a Self-Forming Business Networking Environment. ICEIS (3) 2005: 455-458 - Ângela Lacerda Nobre:
The Semiotic Learning Framework - How to Facilitate Organisational Learning. ICEIS (3) 2005: 459-467 - Airi Salminen, Maiju Virtanen:
Semantic Web Support for Business Processes. ICEIS (3) 2005: 468-473 - Leonardo Pilatti, Jorge Luis Nicolas Audy:
Towards a Global Software Development Maturity Model. ICEIS (3) 2005: 474-477 - Shriram Sankaran, Joseph E. Urban:
Software Project Driven Analysis and Development of Process Activities Supporting Web Based Software Engineering Tools. ICEIS (3) 2005: 478-481 - Masayuki Higuma, Masao J. Matsumoto:
A Methodology of Forecasting Demands of the Communication Traffic. ICEIS (3) 2005: 482-485 - Hatem Ben Sta, Lamjed Ben Said, Khaled Ghédira, Michel Bigand, Jean Pierre Bourey:
Cartographies of Ontology Concepts. ICEIS (3) 2005: 486-494 - Juan C. Lavariega, Andan Salinas, David A. Garza-Salazar, Lorena G. Gomez-Martinez, Martha Sordia:
A Loosely Coupled Architecture for Digital Libraries: The Phronesis Case. ICEIS (3) 2005: 495-498 - Ralf Knackstedt, Karsten Klose, Björn Niehaves, Jörg Becker:
Process Reference Model for Data Warehouse Development - A Consensusoriented Approach. ICEIS (3) 2005: 499-505 - Namho Yoo:
XML-Based Impact Analysis Using Change-Detection Approach for System Interface Control. ICEIS (3) 2005: 506-509 - Georg Grossmann, Yikai Ren, Michael Schrefl, Markus Stumptner:
Definition of Business Process Integration Operators for Generalization. ICEIS (3) 2005: 510-517 - Namho Yoo:
Resource-Aware Configuration Management Using XML for Mitigating Information Assurance Vulnerability. ICEIS (3) 2005: 518-521 - Shawn Maschino:
Intrusion Detection and Response to Automated Attacks. ICEIS (3) 2005: 522-525
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.