Proceedings of the 17th International Conference on Enterprise Information Systems, Volume 2
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter

Slimane Hammoudi, Leszek A. Maciaszek, Ernest Teniente
Proceedings of the 17th International Conference on Enterprise Information Systems, Volume 2
ICEIS v2, 2015.

INFO
DBLP
Scholar
Full names Links ISxN
@proceedings{ICEIS-v2-2015,
	address       = "Barcelona, Spain",
	editor        = "Slimane Hammoudi and Leszek A. Maciaszek and Ernest Teniente",
	isbn          = "978-989-758-097-0",
	publisher     = "{SciTePress}",
	title         = "{Proceedings of the 17th International Conference on Enterprise Information Systems, Volume 2}",
	year          = 2015,
}

Contents (79 items)

ICEIS-v2-2015-BerardiVC #named
R2BA — Rationalizing R2RML Mapping by Assertion (RB, VMPV, MAC), pp. 5–14.
ICEIS-v2-2015-TrujilloOP #authoring #framework #re-engineering #using #validation
Using Technical-Action-Research to Validate a Framework for Authoring Software Engineering Methods (MMT, HO, MP), pp. 15–27.
ICEIS-v2-2015-WeissAHK #modelling #reuse
Fostering Reuse in Choreography Modeling Through Choreography Fragments (AW, VA, MH, DK), pp. 28–36.
ICEIS-v2-2015-Brant-RibeiroAM #approach #interactive #modelling #petri net #using #web
A User-centered Approach for Modeling Web Interactions Using Colored Petri Nets (TBR, RDA, IM, MSS, RGC), pp. 37–48.
ICEIS-v2-2015-CruzMS #modelling #process #set
Deriving a Data Model from a Set of Interrelated Business Process Models (EFC, RJM, MYS), pp. 49–59.
ICEIS-v2-2015-FrancaS #named #quality
SOAQM: Quality Model for SOA Applications based on ISO 25010 (JMSF, MSS), pp. 60–70.
ICEIS-v2-2015-TangL #framework #mining #product line #top-down
Top-down Feature Mining Framework for Software Product Line (YT, HL), pp. 71–81.
ICEIS-v2-2015-IanzenFPMR #automation #product line
Scoping Automation in Software Product Lines (AI, RMF, MAP, AM, SSR), pp. 82–91.
ICEIS-v2-2015-MeloFOS #approach #diagrams #modelling #process #uml
A Model-driven Approach to Transform SysML Internal Block Diagrams to UML Activity Diagrams (MdSM, JMSF, EAOJ, MSS), pp. 92–101.
ICEIS-v2-2015-BrancoOGPC #empirical
An Empirical Study about the Influence of Project Manager Personality in Software Project Effort (DTMCB, ECCdO, LG, RP, TC), pp. 102–113.
ICEIS-v2-2015-CostaMAO #automation #consistency #detection #named #nondeterminism
Fixture — A Tool for Automatic Inconsistencies Detection in Context-aware SPL (PAdSC, FGM, RMdCA, TO), pp. 114–125.
ICEIS-v2-2015-MagnavitaNM #evolution #using
Using EVOWAVE to Analyze Software Evolution (RCM, RLN, MGM), pp. 126–136.
ICEIS-v2-2015-JaouachiKHHJ #image #ontology #rdf #semantics #using #web
Semantic Annotation of Images Extracted from the Web using RDF Patterns and a Domain Ontology (RTJ, MTK, NH, OH, MBJ), pp. 137–144.
ICEIS-v2-2015-DutraPC #development #performance #question #what
What Are the Main Characteristics of High Performance Teams for Software Development? (ACSD, RP, TC), pp. 145–152.
ICEIS-v2-2015-FilhoVC #experience #process
Applying Knowledge Codification in a Post-mortem Process — A Practical Experience (ESdSF, DV, TC), pp. 153–165.
ICEIS-v2-2015-GlocknerML #evaluation #process
Engineering and Evaluation of Process Alternatives in Tactical Logistics Planning (MG, SM, AL), pp. 166–176.
ICEIS-v2-2015-AbadeFL #overview #perspective #testing
Testing M2T Transformations — A Systematic Literature Review (AA, FF, DL), pp. 177–187.
ICEIS-v2-2015-JuniorP #approach #identification #named #ontology #requirements
OnTheme/Doc — An Ontology-based Approach for Crosscutting Concern Identification from Software Requirements (PAPJ, RADP), pp. 188–200.
ICEIS-v2-2015-NetoKCBM #android #architecture #case study #design
Unveiling the Architecture and Design of Android Applications — An Exploratory Study (ECN, UK, RC, RB, LM), pp. 201–211.
ICEIS-v2-2015-LedvinkaK #named #object-oriented #ontology
JOPA: Accessing Ontologies in an Object-oriented Way (ML, PK), pp. 212–221.
ICEIS-v2-2015-ZhomartkyzyB #development #information management #monitoring
Monitoring the Development of University Scientific Schools in University Knowledge Management (GZ, TB), pp. 222–230.
ICEIS-v2-2015-ThommazoCHGPBF #complexity #dependence #requirements #testing #using
Using the Dependence Level Among Requirements to Priorize the Regression Testing Set and Characterize the Complexity of Requirements Change (ADT, KC, EMH, GG, JP, AB, SF), pp. 231–241.
ICEIS-v2-2015-MikhaylovFSZFT #locality #network #process
System of Localisation of the Network Activity Source in APCS Data Lines (DM, SDF, YYS, AZ, ASF, AT), pp. 245–251.
ICEIS-v2-2015-BandyszakRWP #analysis #information management #specification #validation
Supporting the Validation of Structured Analysis Specifications in the Engineering of Information Systems by Test Path Exploration (TB, MR, TW, KP), pp. 252–259.
ICEIS-v2-2015-FrantzSRYE #ecosystem #integration #markov #on the #process #using
On using Markov Decision Processes to Model Integration Solutions for Disparate Resources in Software Ecosystems (RZF, SS, FRF, IY, MTME), pp. 260–267.
ICEIS-v2-2015-GeraldiOCS #empirical #modelling #variability
Checklist-based Inspection of SMarty Variability Models — Proposal and Empirical Feasibility Study (RTG, EOJ, TC, IS), pp. 268–276.
ICEIS-v2-2015-BraunE #enterprise #framework #modelling
A Generic Framework for Modifying and Extending Enterprise Modeling Languages (RB, WE), pp. 277–286.
ICEIS-v2-2015-OliveiraF #enterprise #framework #overview #policy #sorting
A Spatial Data Infrastructure Review — Sorting the Actors and Policies from Enterprise Viewpoint (ILO, JLF), pp. 287–294.
ICEIS-v2-2015-BeraOC #component #identification #modelling #representation #variability
Evidence-based SMarty Support for Variability Identification and Representation in Component Models (MHGB, EOJ, TEC), pp. 295–302.
ICEIS-v2-2015-FariasNOCM #case study #commit #email #mining #repository
Analyzing Distributions of Emails and Commits from OSS Contributors through Mining Software Repositories — An Exploratory Study (MAdFF, RLN, PO, MCJ, MGM), pp. 303–310.
ICEIS-v2-2015-MoraisS #interface #modelling #quality
Assessing the Quality of User-interface Modeling Languages (FM, ARdS), pp. 311–319.
ICEIS-v2-2015-PereiraBD #formal method #uml
Mapping Formal Results Back to UML Semi-formal Model (VP, LB, MED), pp. 320–329.
ICEIS-v2-2015-TrinkenreichSB #maturity #metric #modelling
Metrics to Support IT Service Maturity Models — A Systematic Mapping Study (BT, GS, MPB), pp. 330–337.
ICEIS-v2-2015-CruzMS15a #modelling #process #set
Bridging the Gap between a Set of Interrelated Business Process Models and Software Models (EFC, RJM, MYS), pp. 338–345.
ICEIS-v2-2015-MazurKW #data access #modelling #on the #performance #security
On the Modelling of the Influence of Access Control Management to the System Security and Performance (KM, BK, AW), pp. 346–354.
ICEIS-v2-2015-PieroniP #configuration management #domain-specific language #network
A DSL for Configuration Management of Integrated Network Management System (RP, RADP), pp. 355–364.
ICEIS-v2-2015-BenincaHGLBM #information management #overview
Knowledge Management Practices in GSD — A Systematic Literature Review Update (RdAB, EHMH, EVCG, GCLL, RB, YM), pp. 365–373.
ICEIS-v2-2015-KhlifKKD #approach #architecture #multi #uml
A UML-based Approach for Multi-scale Software Architectures (IK, MHK, AHK, KD), pp. 374–381.
ICEIS-v2-2015-SariK #analysis #debugging #monitoring #predict #using
Bug Prediction for an ATM Monitoring Software — Use of Logistic Regression Analysis for Bug Prediction (ÖS, OK), pp. 382–387.
ICEIS-v2-2015-ValenteAN #design #towards
Improving Software Design Decisions towards Enhanced Return of Investment (PV, DA, NJN), pp. 388–394.
ICEIS-v2-2015-TrinkenreichS #case study #maturity #metric #modelling
Metrics to Support It Service Maturity Models — A Case Study (BT, GS), pp. 395–403.
ICEIS-v2-2015-MunizNM #functional #modelling #named #statistics #testing
TCG — A Model-based Testing Tool for Functional and Statistical Testing (LLM, USCN, PHMM), pp. 404–411.
ICEIS-v2-2015-KustersMT #agile #development #fault #injection
The Impact of Lean Techniques on Factors Influencing Defect Injection in Software Development (RJK, FMM, JJMT), pp. 412–419.
ICEIS-v2-2015-BaldassarreBCCV #community #framework
Building a Community Cloud Infrastructure for a Logistics Project (MTB, NB, DC, GdC, GV), pp. 420–427.
ICEIS-v2-2015-LucenaAAAJ #approach #modelling
Integrating User Stories and i* Models — A Systematic Approach (ML, CA, FMRA, EA, AJ), pp. 428–438.
ICEIS-v2-2015-BayaADM #approach #composition #product line #scalability
Dynamic Large Scale Product Lines through Modularization Approach (AB, BEA, ID, ZM), pp. 439–444.
ICEIS-v2-2015-ZoglaMS #analysis #problem #quality #taxonomy
Analysis of Data Quality Problem Taxonomies (AZ, IM, ES), pp. 445–450.
ICEIS-v2-2015-Judrups #analysis #information management #integration
Analysis of Knowledge Management and E-Learning Integration Approaches (JJ), pp. 451–456.
ICEIS-v2-2015-MendesAASNM #evolution #monitoring #named #open source #technical debt #using #visualisation
VisMinerTD — An Open Source Tool to Support the Monitoring of the Technical Debt Evolution using Software Visualization (TSM, DAA, NSRA, ROS, RLN, MGM), pp. 457–462.
ICEIS-v2-2015-McharfiADBK #product line #traceability
Return on Investment of Software Product Line Traceability in the Short, Mid and Long Term (ZM, BEA, ID, AB, AK), pp. 463–468.
ICEIS-v2-2015-SarsharNR #case study #comparison #smarttech
A Study on the Usage of Smartphone Apps in Fire Scenarios — Comparison between GDACSmobile and SmartRescue Apps (PS, VN, JR), pp. 469–474.
ICEIS-v2-2015-SouzaVS #analysis #semantics
Semantically Enriching the Detrending Step of Time Series Analysis (LdS, MSMGV, MSS), pp. 475–481.
ICEIS-v2-2015-PerezNGD #analysis #development #process
A Tool for the Analysis of Change Management Processes in Software Development Cycles (MP, ÁN, HAPG, JCD), pp. 482–485.
ICEIS-v2-2015-PereiraD #formal method #logic #semantics #uml #using
Systematic Mapping — Formalization of UML Semantics using Temporal Logic (VP, MED), pp. 486–493.
ICEIS-v2-2015-SarmientoALS #modelling #petri net
Mapping Textual Scenarios to Analyzable Petri-Net Models (ES, EA, JCSdPL, GS), pp. 494–501.
ICEIS-v2-2015-BaldassarreBCV #metric
Tracking Project Progress with Earned Value Management Metrics — A Real Case (MTB, NB, DC, GV), pp. 502–508.
ICEIS-v2-2015-BarbarI #named
BlueKey — A Bluetooth Secure Solution for Accessing Personal Computers (AB, AI), pp. 509–515.
ICEIS-v2-2015-CuencaBBT #case study #concept #development #framework #multi
Conceptual Interoperability Barriers Framework (CIBF) — A Case Study of Multi-organizational Software Development (LC, AB, ÁOB, JJMT), pp. 521–531.
ICEIS-v2-2015-SmirnovP #architecture #hybrid #network #peer-to-peer #privacy #recommendation
Privacy-preserving Hybrid Peer-to-Peer Recommendation System Architecture — Locality-Sensitive Hashing in Structured Overlay Network (AVS, AP), pp. 532–542.
ICEIS-v2-2015-AizebojeP #approach #pointer #using
An Approach to using a Laser Pointer as a Mouse (JA, TP), pp. 543–552.
ICEIS-v2-2015-EttaziHNE #adaptation #approach #towards #transaction
Towards a Context-Aware Adaptation Approach for Transactional Services (WE, HH, MN, SE), pp. 553–562.
ICEIS-v2-2015-DuarteOB #approach #architecture
Smart Cities — An Architectural Approach (AD, CO, JB), pp. 563–573.
ICEIS-v2-2015-FellaBB #composition #constraints #web #web service
Temporal Constraint in Web Service Composition (BF, SB, AB), pp. 577–584.
ICEIS-v2-2015-GalalE #modelling #twitter
Dynamic Modeling of Twitter Users (AG, AEK), pp. 585–593.
ICEIS-v2-2015-CeredaN #adaptation #automaton #recommendation
A Recommendation Engine based on Adaptive Automata (PRMC, JJN), pp. 594–601.
ICEIS-v2-2015-Boon-itt #quality #self
Managing Service Quality of Self-Service Technologies to Enhance e-Satisfaction in Digital Banking Context — The Roles of Technology Readiness and Perceived Value (SBi), pp. 602–609.
ICEIS-v2-2015-MaranMAWO #information management #query
Proactive Domain Data Querying based on Context Information in Ambient Assisted Living Environments (VM, AM, IA, LKW, JPMdO), pp. 610–617.
ICEIS-v2-2015-Avila-SantosHKB #multi
Building Coalitions of Competitors in the Negotiation of Multiparty e-Contracts through Consultations (APAS, JH, DSK, EB), pp. 618–625.
ICEIS-v2-2015-KamalKVB #delivery #performance #using
Efficient Use of Voice as a Channel for Delivering Public Services (KKK, MK, BV, KB), pp. 626–631.
ICEIS-v2-2015-CanutMOPS #algorithm #case study #comparative #empirical #profiling
A Comparative Study of Two Egocentric-based User Profiling Algorithms — Experiment in Delicious (CMFC, MM, SOa, AP, FS), pp. 632–639.
ICEIS-v2-2015-FissaaGHN #composition #how #question #semantics
How Can Semantics and Context Awareness Enhance the Composition of Context-aware Services? (TF, HG, HH, MN), pp. 640–647.
ICEIS-v2-2015-SarinhoLS #dataset #linked data #open data #question
Can You Find All the Data You Expect in a Linked Dataset? (WTS, BFL, DS), pp. 648–655.
ICEIS-v2-2015-AngioniCT #collaboration #mining
Evaluating Potential Improvements of Collaborative Filtering with Opinion Mining (MA, MLC, FT), pp. 656–661.
ICEIS-v2-2015-RolimRLBSSG #novel #social #towards
Towards a Novel Engine to Underlie the Data Transmission of Social Urban Sensing Applications (COR, AGdMR, VRQL, GAB, TFMdS, AMS, CFRG), pp. 662–667.
ICEIS-v2-2015-VitolsBSSAS #multi
Multi-payment Solution for Smartlet Applications (GV, NB, JS, VS, IA, IS), pp. 668–673.
ICEIS-v2-2015-KriouileMA #as a service #configuration management #towards
Towards a High Configurable SaaS — To Deploy and Bind Auser-aware Tenancy of the SaaS (HK, ZM, BEA), pp. 674–679.
ICEIS-v2-2015-CavallariAT #aspect-oriented #mobile
Organisational Aspects and Anatomy of an Attack on NFC/HCE Mobile Payment Systems (MC, LA, FT), pp. 685–700.
ICEIS-v2-2015-Martin-Fernandez #alias #encryption #performance #using
Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography (FMF, PCG, CCG), pp. 701–708.
ICEIS-v2-2015-AlahmadiLN #detection #internet #process #profiling #using
Using Internet Activity Profiling for Insider-threat Detection (BAA, PAL, JRCN), pp. 709–720.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.