Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2018
- Adina Aldea, Marcella Cindy Kusumaningrum, Maria-Eugenia Iacob, Maya Daneva:
Modeling and Analyzing Digital Business Ecosystems: An Approach and Evaluation. CBI (2) 2018: 156-163 - Raphael Arar, Guang-Jie Ren, Shun Jiang, Valeria Becker, Lei Huang, Eric Young Liu:
Applying User-Centered Design to Business Modeling: CBM.next as a Case Study. CBI (2) 2018: 164-169 - Saïd Assar, Mouaad Hafsi:
Towards a Visual Modeling Approach to Manage the Impact of Digital Transformation on Information Systems. CBI (2) 2018: 21-31 - Mohamed Batran, Ayumi Arai, Hiroshi Kanasugi, Silvino Cumbane, Cecilio Grachane, Yoshihide Sekimoto, Ryosuke Shibasaki:
Urban Travel Time Estimation in Greater Maputo Using Mobile Phone Big Data. CBI (2) 2018: 122-127 - Arne Bergmann, Stefan Strecker:
Toward Modeling Strategic Plans: Requirements & Language Design Considerations. CBI (2) 2018: 11-20 - Manel Brichni, Dimitrios Kampas, Anusha Choory Balaji, Jorge Sanz:
Some Challenges and Lessons-Learnt From the Practice of Analytics. CBI (2) 2018: 108-109 - Nazarov Dmitrii:
Intelligent Service for Finding Implicit Factors. CBI (2) 2018: 153-155 - Amjad Fayoumi, Khalid BinSalman:
Effective Remote Monitoring System for Heart Disease Patients. CBI (2) 2018: 114-121 - Kai Gand:
Towards Conceptual Enhancements of the Business Model Canvas: The Case of Health Information Technology. CBI (2) 2018: 62-71 - Lin Gao, Dimitrios Kampas, Kalle Rinne:
Capturing Investor Sentiment: Advancing Predictability in Finance with Computer Science Approaches. CBI (2) 2018: 97-99 - Luís Pissarra Gonçalves, Alberto Rodrigues da Silva:
A Catalogue of Reusable Security Concerns: Focus on Privacy Threats. CBI (2) 2018: 52-61 - Christian Huemer, Gerti Kappel, Manuel Wimmer, Henderik A. Proper, Siegfried Reich, Wernher Behrendt, Stefan Thalmann, Georg Weichhart, Alois Zoitl:
Interoperability and Integration in Future Production Systems. CBI (2) 2018: 175-177 - Uzma Iffat, Sahil Bhatia, Alexandru Tantar, Jorge Sanz, Cedric Schockaert, Alexander Schmitz, Frank Giroldini, Yves Reuter, Fabrice Hansen:
New Digital Services for Manufacturing Industry Using Analytics: The Case of Blast Furnace Thermal Regulation. CBI (2) 2018: 89-91 - Zahraa Marafie, Kwei-Jay Lin, Yanlong Zhai, Jing Li:
ProActive Fintech: Using Intelligent IoT to Deliver Positive InsurTech Feedback. CBI (2) 2018: 72-81 - Stefan Marksteiner:
Smart Ticket Protection: An Architecture for Cyber-Protecting Physical Tickets Using Digitally Signed Random Pattern Markers. CBI (2) 2018: 110-113 - Stefan Marksteiner:
Reasoning on Adopting OPC UA for an IoT-Enhanced Smart Energy System from a Security Perspective. CBI (2) 2018: 140-143 - Arshad Muhammad Mehar, Asif Qumer Gill, Kenan M. Matawie:
Analytical Model for Residential Predicting Energy Consumption. CBI (2) 2018: 82-88 - Artem Priemyshev, Vyacheslav Zhukov, Mikhail M. Komarov:
The Behavior of Consumers in the Shop Based on the Data from "Locastor" System. CBI (2) 2018: 128-133 - Diogo Proença, José Borbinha:
Maturity Model Architect: A Tool for Maturity Assessment Support. CBI (2) 2018: 42-51 - Pavel Seda, Pavel Masek, Martin Stusek, Jiri Hosek, Jindriska Sedova:
Visualization and Managing Platform for Narrowband-IoT Devices. CBI (2) 2018: 134-139 - David Silva, Miguel Mira da Silva, Rúben Pereira:
Baseline Mechanisms for Enterprise Governance of IT in SMEs. CBI (2) 2018: 32-41 - Jean-Sébastien Sottet, Eric Grandry, Marija Bjekovic:
Managing Regulatory System with Megamodelling. CBI (2) 2018: 1-10 - Pedro Sousa, Maria Carvalho:
Dynamic Organization's Representation. Linking Project Management with Enterprise Architecture. CBI (2) 2018: 170-174 - Stefan Thalmann, Juergen Mangler, Tobias Schreck, Christian Huemer, Marc Streit, Florian Pauker, Georg Weichhart, Stefan Schulte, Christian Kittl, Christoph Pollak, Matej Vukovic, Gerti Kappel, Milot Gashi, Stefanie Rinderle-Ma, Josef Suschnigg, Nikolina Jekic, Stefanie N. Lindstaedt:
Data Analytics for Industrial Process Improvement A Vision Paper. CBI (2) 2018: 92-96 - O. A. Tsukanova, Svetlana V. Maltseva, K. E. Fedorov:
Modeling and Analysis of Social Network Dynamics on the Macro-Level in View of the Customer-Centric Concept. CBI (2) 2018: 144-147 - Natalija Vlajic, Shun-Nam Wilson Chow, Xavon Charles:
Malwareless Web-Analytics Pollution (MWAP): A Very Simple Yet Invincible Attack. CBI (2) 2018: 100-107 - Henderik A. Proper, Stefan Strecker, Christian Huemer, Christophe Feltus, Wided Guédria, Iván S. Razo-Zapata, Manel Brichni, David Rozier, Mikhail M. Komarov, Svetlana V. Maltseva, Sérgio Guerreiro:
20th IEEE Conference on Business Informatics, CBI 2018, Vienna, Austria, July 11-14, 2018, Volume 2 - Research-in-Progress Papers and Workshops. IEEE Computer Society 2018 [contents] - (Withdrawn) Discovery of Technology Trends from Patent Data on the Basis of Predictive Analytics. CBI (2) 2018: 148-152
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-12 06:15 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint