Slimane Hammoudi, Leszek A. Maciaszek, Ernest Teniente
Proceedings of the 17th International Conference on Enterprise Information Systems, Volume 2
ICEIS v2, 2015.
@proceedings{ICEIS-v2-2015, address = "Barcelona, Spain", editor = "Slimane Hammoudi and Leszek A. Maciaszek and Ernest Teniente", isbn = "978-989-758-097-0", publisher = "{SciTePress}", title = "{Proceedings of the 17th International Conference on Enterprise Information Systems, Volume 2}", year = 2015, }
Contents (79 items)
- ICEIS-v2-2015-BerardiVC #named
- R2BA — Rationalizing R2RML Mapping by Assertion (RB, VMPV, MAC), pp. 5–14.
- ICEIS-v2-2015-TrujilloOP #authoring #framework #re-engineering #using #validation
- Using Technical-Action-Research to Validate a Framework for Authoring Software Engineering Methods (MMT, HO, MP), pp. 15–27.
- ICEIS-v2-2015-WeissAHK #modelling #reuse
- Fostering Reuse in Choreography Modeling Through Choreography Fragments (AW, VA, MH, DK), pp. 28–36.
- ICEIS-v2-2015-Brant-RibeiroAM #approach #interactive #modelling #petri net #using #web
- A User-centered Approach for Modeling Web Interactions Using Colored Petri Nets (TBR, RDA, IM, MSS, RGC), pp. 37–48.
- ICEIS-v2-2015-CruzMS #modelling #process #set
- Deriving a Data Model from a Set of Interrelated Business Process Models (EFC, RJM, MYS), pp. 49–59.
- ICEIS-v2-2015-FrancaS #named #quality
- SOAQM: Quality Model for SOA Applications based on ISO 25010 (JMSF, MSS), pp. 60–70.
- ICEIS-v2-2015-TangL #framework #mining #product line #top-down
- Top-down Feature Mining Framework for Software Product Line (YT, HL), pp. 71–81.
- ICEIS-v2-2015-IanzenFPMR #automation #product line
- Scoping Automation in Software Product Lines (AI, RMF, MAP, AM, SSR), pp. 82–91.
- ICEIS-v2-2015-MeloFOS #approach #diagrams #modelling #process #uml
- A Model-driven Approach to Transform SysML Internal Block Diagrams to UML Activity Diagrams (MdSM, JMSF, EAOJ, MSS), pp. 92–101.
- ICEIS-v2-2015-BrancoOGPC #empirical
- An Empirical Study about the Influence of Project Manager Personality in Software Project Effort (DTMCB, ECCdO, LG, RP, TC), pp. 102–113.
- ICEIS-v2-2015-CostaMAO #automation #consistency #detection #named #nondeterminism
- Fixture — A Tool for Automatic Inconsistencies Detection in Context-aware SPL (PAdSC, FGM, RMdCA, TO), pp. 114–125.
- ICEIS-v2-2015-MagnavitaNM #evolution #using
- Using EVOWAVE to Analyze Software Evolution (RCM, RLN, MGM), pp. 126–136.
- ICEIS-v2-2015-JaouachiKHHJ #image #ontology #rdf #semantics #using #web
- Semantic Annotation of Images Extracted from the Web using RDF Patterns and a Domain Ontology (RTJ, MTK, NH, OH, MBJ), pp. 137–144.
- ICEIS-v2-2015-DutraPC #development #performance #question #what
- What Are the Main Characteristics of High Performance Teams for Software Development? (ACSD, RP, TC), pp. 145–152.
- ICEIS-v2-2015-FilhoVC #experience #process
- Applying Knowledge Codification in a Post-mortem Process — A Practical Experience (ESdSF, DV, TC), pp. 153–165.
- ICEIS-v2-2015-GlocknerML #evaluation #process
- Engineering and Evaluation of Process Alternatives in Tactical Logistics Planning (MG, SM, AL), pp. 166–176.
- ICEIS-v2-2015-AbadeFL #overview #perspective #testing
- Testing M2T Transformations — A Systematic Literature Review (AA, FF, DL), pp. 177–187.
- ICEIS-v2-2015-JuniorP #approach #identification #named #ontology #requirements
- OnTheme/Doc — An Ontology-based Approach for Crosscutting Concern Identification from Software Requirements (PAPJ, RADP), pp. 188–200.
- ICEIS-v2-2015-NetoKCBM #android #architecture #case study #design
- Unveiling the Architecture and Design of Android Applications — An Exploratory Study (ECN, UK, RC, RB, LM), pp. 201–211.
- ICEIS-v2-2015-LedvinkaK #named #object-oriented #ontology
- JOPA: Accessing Ontologies in an Object-oriented Way (ML, PK), pp. 212–221.
- ICEIS-v2-2015-ZhomartkyzyB #development #information management #monitoring
- Monitoring the Development of University Scientific Schools in University Knowledge Management (GZ, TB), pp. 222–230.
- ICEIS-v2-2015-ThommazoCHGPBF #complexity #dependence #requirements #testing #using
- Using the Dependence Level Among Requirements to Priorize the Regression Testing Set and Characterize the Complexity of Requirements Change (ADT, KC, EMH, GG, JP, AB, SF), pp. 231–241.
- ICEIS-v2-2015-MikhaylovFSZFT #locality #network #process
- System of Localisation of the Network Activity Source in APCS Data Lines (DM, SDF, YYS, AZ, ASF, AT), pp. 245–251.
- ICEIS-v2-2015-BandyszakRWP #analysis #information management #specification #validation
- Supporting the Validation of Structured Analysis Specifications in the Engineering of Information Systems by Test Path Exploration (TB, MR, TW, KP), pp. 252–259.
- ICEIS-v2-2015-FrantzSRYE #ecosystem #integration #markov #on the #process #using
- On using Markov Decision Processes to Model Integration Solutions for Disparate Resources in Software Ecosystems (RZF, SS, FRF, IY, MTME), pp. 260–267.
- ICEIS-v2-2015-GeraldiOCS #empirical #modelling #variability
- Checklist-based Inspection of SMarty Variability Models — Proposal and Empirical Feasibility Study (RTG, EOJ, TC, IS), pp. 268–276.
- ICEIS-v2-2015-BraunE #enterprise #framework #modelling
- A Generic Framework for Modifying and Extending Enterprise Modeling Languages (RB, WE), pp. 277–286.
- ICEIS-v2-2015-OliveiraF #enterprise #framework #overview #policy #sorting
- A Spatial Data Infrastructure Review — Sorting the Actors and Policies from Enterprise Viewpoint (ILO, JLF), pp. 287–294.
- ICEIS-v2-2015-BeraOC #component #identification #modelling #representation #variability
- Evidence-based SMarty Support for Variability Identification and Representation in Component Models (MHGB, EOJ, TEC), pp. 295–302.
- ICEIS-v2-2015-FariasNOCM #case study #commit #email #mining #repository
- Analyzing Distributions of Emails and Commits from OSS Contributors through Mining Software Repositories — An Exploratory Study (MAdFF, RLN, PO, MCJ, MGM), pp. 303–310.
- ICEIS-v2-2015-MoraisS #interface #modelling #quality
- Assessing the Quality of User-interface Modeling Languages (FM, ARdS), pp. 311–319.
- ICEIS-v2-2015-PereiraBD #formal method #uml
- Mapping Formal Results Back to UML Semi-formal Model (VP, LB, MED), pp. 320–329.
- ICEIS-v2-2015-TrinkenreichSB #maturity #metric #modelling
- Metrics to Support IT Service Maturity Models — A Systematic Mapping Study (BT, GS, MPB), pp. 330–337.
- ICEIS-v2-2015-CruzMS15a #modelling #process #set
- Bridging the Gap between a Set of Interrelated Business Process Models and Software Models (EFC, RJM, MYS), pp. 338–345.
- ICEIS-v2-2015-MazurKW #data access #modelling #on the #performance #security
- On the Modelling of the Influence of Access Control Management to the System Security and Performance (KM, BK, AW), pp. 346–354.
- ICEIS-v2-2015-PieroniP #configuration management #domain-specific language #network
- A DSL for Configuration Management of Integrated Network Management System (RP, RADP), pp. 355–364.
- ICEIS-v2-2015-BenincaHGLBM #information management #overview
- Knowledge Management Practices in GSD — A Systematic Literature Review Update (RdAB, EHMH, EVCG, GCLL, RB, YM), pp. 365–373.
- ICEIS-v2-2015-KhlifKKD #approach #architecture #multi #uml
- A UML-based Approach for Multi-scale Software Architectures (IK, MHK, AHK, KD), pp. 374–381.
- ICEIS-v2-2015-SariK #analysis #debugging #monitoring #predict #using
- Bug Prediction for an ATM Monitoring Software — Use of Logistic Regression Analysis for Bug Prediction (ÖS, OK), pp. 382–387.
- ICEIS-v2-2015-ValenteAN #design #towards
- Improving Software Design Decisions towards Enhanced Return of Investment (PV, DA, NJN), pp. 388–394.
- ICEIS-v2-2015-TrinkenreichS #case study #maturity #metric #modelling
- Metrics to Support It Service Maturity Models — A Case Study (BT, GS), pp. 395–403.
- ICEIS-v2-2015-MunizNM #functional #modelling #named #statistics #testing
- TCG — A Model-based Testing Tool for Functional and Statistical Testing (LLM, USCN, PHMM), pp. 404–411.
- ICEIS-v2-2015-KustersMT #agile #development #fault #injection
- The Impact of Lean Techniques on Factors Influencing Defect Injection in Software Development (RJK, FMM, JJMT), pp. 412–419.
- ICEIS-v2-2015-BaldassarreBCCV #community #framework
- Building a Community Cloud Infrastructure for a Logistics Project (MTB, NB, DC, GdC, GV), pp. 420–427.
- ICEIS-v2-2015-LucenaAAAJ #approach #modelling
- Integrating User Stories and i* Models — A Systematic Approach (ML, CA, FMRA, EA, AJ), pp. 428–438.
- ICEIS-v2-2015-BayaADM #approach #composition #product line #scalability
- Dynamic Large Scale Product Lines through Modularization Approach (AB, BEA, ID, ZM), pp. 439–444.
- ICEIS-v2-2015-ZoglaMS #analysis #problem #quality #taxonomy
- Analysis of Data Quality Problem Taxonomies (AZ, IM, ES), pp. 445–450.
- ICEIS-v2-2015-Judrups #analysis #information management #integration
- Analysis of Knowledge Management and E-Learning Integration Approaches (JJ), pp. 451–456.
- ICEIS-v2-2015-MendesAASNM #evolution #monitoring #named #open source #technical debt #using #visualisation
- VisMinerTD — An Open Source Tool to Support the Monitoring of the Technical Debt Evolution using Software Visualization (TSM, DAA, NSRA, ROS, RLN, MGM), pp. 457–462.
- ICEIS-v2-2015-McharfiADBK #product line #traceability
- Return on Investment of Software Product Line Traceability in the Short, Mid and Long Term (ZM, BEA, ID, AB, AK), pp. 463–468.
- ICEIS-v2-2015-SarsharNR #case study #comparison #smarttech
- A Study on the Usage of Smartphone Apps in Fire Scenarios — Comparison between GDACSmobile and SmartRescue Apps (PS, VN, JR), pp. 469–474.
- ICEIS-v2-2015-SouzaVS #analysis #semantics
- Semantically Enriching the Detrending Step of Time Series Analysis (LdS, MSMGV, MSS), pp. 475–481.
- ICEIS-v2-2015-PerezNGD #analysis #development #process
- A Tool for the Analysis of Change Management Processes in Software Development Cycles (MP, ÁN, HAPG, JCD), pp. 482–485.
- ICEIS-v2-2015-PereiraD #formal method #logic #semantics #uml #using
- Systematic Mapping — Formalization of UML Semantics using Temporal Logic (VP, MED), pp. 486–493.
- ICEIS-v2-2015-SarmientoALS #modelling #petri net
- Mapping Textual Scenarios to Analyzable Petri-Net Models (ES, EA, JCSdPL, GS), pp. 494–501.
- ICEIS-v2-2015-BaldassarreBCV #metric
- Tracking Project Progress with Earned Value Management Metrics — A Real Case (MTB, NB, DC, GV), pp. 502–508.
- ICEIS-v2-2015-BarbarI #named
- BlueKey — A Bluetooth Secure Solution for Accessing Personal Computers (AB, AI), pp. 509–515.
- ICEIS-v2-2015-CuencaBBT #case study #concept #development #framework #multi
- Conceptual Interoperability Barriers Framework (CIBF) — A Case Study of Multi-organizational Software Development (LC, AB, ÁOB, JJMT), pp. 521–531.
- ICEIS-v2-2015-SmirnovP #architecture #hybrid #network #peer-to-peer #privacy #recommendation
- Privacy-preserving Hybrid Peer-to-Peer Recommendation System Architecture — Locality-Sensitive Hashing in Structured Overlay Network (AVS, AP), pp. 532–542.
- ICEIS-v2-2015-AizebojeP #approach #pointer #using
- An Approach to using a Laser Pointer as a Mouse (JA, TP), pp. 543–552.
- ICEIS-v2-2015-EttaziHNE #adaptation #approach #towards #transaction
- Towards a Context-Aware Adaptation Approach for Transactional Services (WE, HH, MN, SE), pp. 553–562.
- ICEIS-v2-2015-DuarteOB #approach #architecture
- Smart Cities — An Architectural Approach (AD, CO, JB), pp. 563–573.
- ICEIS-v2-2015-FellaBB #composition #constraints #web #web service
- Temporal Constraint in Web Service Composition (BF, SB, AB), pp. 577–584.
- ICEIS-v2-2015-GalalE #modelling #twitter
- Dynamic Modeling of Twitter Users (AG, AEK), pp. 585–593.
- ICEIS-v2-2015-CeredaN #adaptation #automaton #recommendation
- A Recommendation Engine based on Adaptive Automata (PRMC, JJN), pp. 594–601.
- ICEIS-v2-2015-Boon-itt #quality #self
- Managing Service Quality of Self-Service Technologies to Enhance e-Satisfaction in Digital Banking Context — The Roles of Technology Readiness and Perceived Value (SBi), pp. 602–609.
- ICEIS-v2-2015-MaranMAWO #information management #query
- Proactive Domain Data Querying based on Context Information in Ambient Assisted Living Environments (VM, AM, IA, LKW, JPMdO), pp. 610–617.
- ICEIS-v2-2015-Avila-SantosHKB #multi
- Building Coalitions of Competitors in the Negotiation of Multiparty e-Contracts through Consultations (APAS, JH, DSK, EB), pp. 618–625.
- ICEIS-v2-2015-KamalKVB #delivery #performance #using
- Efficient Use of Voice as a Channel for Delivering Public Services (KKK, MK, BV, KB), pp. 626–631.
- ICEIS-v2-2015-CanutMOPS #algorithm #case study #comparative #empirical #profiling
- A Comparative Study of Two Egocentric-based User Profiling Algorithms — Experiment in Delicious (CMFC, MM, SOa, AP, FS), pp. 632–639.
- ICEIS-v2-2015-FissaaGHN #composition #how #question #semantics
- How Can Semantics and Context Awareness Enhance the Composition of Context-aware Services? (TF, HG, HH, MN), pp. 640–647.
- ICEIS-v2-2015-SarinhoLS #dataset #linked data #open data #question
- Can You Find All the Data You Expect in a Linked Dataset? (WTS, BFL, DS), pp. 648–655.
- ICEIS-v2-2015-AngioniCT #collaboration #mining
- Evaluating Potential Improvements of Collaborative Filtering with Opinion Mining (MA, MLC, FT), pp. 656–661.
- ICEIS-v2-2015-RolimRLBSSG #novel #social #towards
- Towards a Novel Engine to Underlie the Data Transmission of Social Urban Sensing Applications (COR, AGdMR, VRQL, GAB, TFMdS, AMS, CFRG), pp. 662–667.
- ICEIS-v2-2015-VitolsBSSAS #multi
- Multi-payment Solution for Smartlet Applications (GV, NB, JS, VS, IA, IS), pp. 668–673.
- ICEIS-v2-2015-KriouileMA #as a service #configuration management #towards
- Towards a High Configurable SaaS — To Deploy and Bind Auser-aware Tenancy of the SaaS (HK, ZM, BEA), pp. 674–679.
- ICEIS-v2-2015-CavallariAT #aspect-oriented #mobile
- Organisational Aspects and Anatomy of an Attack on NFC/HCE Mobile Payment Systems (MC, LA, FT), pp. 685–700.
- ICEIS-v2-2015-Martin-Fernandez #alias #encryption #performance #using
- Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography (FMF, PCG, CCG), pp. 701–708.
- ICEIS-v2-2015-AlahmadiLN #detection #internet #process #profiling #using
- Using Internet Activity Profiling for Insider-threat Detection (BAA, PAL, JRCN), pp. 709–720.
16 ×#modelling
11 ×#using
9 ×#approach
9 ×#process
8 ×#named
6 ×#analysis
6 ×#case study
6 ×#framework
5 ×#development
5 ×#information management
11 ×#using
9 ×#approach
9 ×#process
8 ×#named
6 ×#analysis
6 ×#case study
6 ×#framework
5 ×#development
5 ×#information management