82 papers:
DAC-2015-ShererRO #functional #safety- Ensuring functional safety compliance for ISO 26262 (ADS, JR, RO), p. 3.
ICGT-2015-KwantesGKR #modelling #process #towards #verification- Towards Compliance Verification Between Global and Local Process Models (PMK, PVG, JK, AR), pp. 221–236.
CHI-2015-KonradBCTNDPW #adaptation #automation #reduction- Finding the Adaptive Sweet Spot: Balancing Compliance and Achievement in Automated Stress Reduction (AK, VB, NC, ST, LN, HD, PP, SW), pp. 3829–3838.
MoDELS-2015-SunkleKK #case study #modelling- Model-driven regulatory compliance: A case study of “Know Your Customer” regulations (SS, DK, VK), pp. 436–445.
SAC-2015-AwadBESAS #anti #approach #detection #process #runtime- Runtime detection of business process compliance violations: an approach based on anti patterns (AA, AB, AE, RES, AA, SS), pp. 1203–1210.
SAC-2015-OjameruayeB #analysis #framework- A risk — aware framework for compliance goal-obstacle analysis (BO, RB), pp. 1401–1402.
ESEC-FSE-2015-GhaisasMBGKV #automation #security #towards- Towards automating the security compliance value chain (SG, MM, BB, AG, RK, HMV), pp. 1014–1017.
VMCAI-2015-CortesiFPT #mobile #policy #privacy #semantics #verification- Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications (AC, PF, MP, OT), pp. 61–79.
ASE-2014-BurgDMDGH #consistency #nondeterminism #process- Tracing software build processes to uncover license compliance inconsistencies (SvdB, ED, SM, JD, DMG, AH), pp. 731–742.
ASE-2014-PruijtKWB #architecture #named #set- HUSACCT: architecture compliance checking with rich sets of module and rule types (LJP, CK, JMvdW, SB), pp. 851–854.
EDOC-2014-KoetterKWFL #requirements- Integrating Compliance Requirements across Business and IT (FK, MK, AW, CF, FL), pp. 218–225.
ICEIS-v3-2014-AlvesVS #analysis #architecture- Architecture Principles Compliance Analysis (JA, AV, PS), pp. 328–334.
RE-2014-Buksa #process- Business processes and regulations compliance management technology (IB), pp. 489–493.
RE-2014-GhanavatiRDA #multi- Goal-oriented compliance with multiple regulations (SG, AR, ED, DA), pp. 73–82.
RE-2014-IngolfoSM #reasoning #requirements- Nòmos 3: Reasoning about regulatory compliance of requirements (SI, AS, JM), pp. 313–314.
REFSQ-2014-OjameruayeB #requirements #using- Systematic Elaboration of Compliance Requirements Using Compliance Debt and Portfolio Theory (BO, RB), pp. 152–167.
FSE-2014-Brunink #monitoring #non-functional- Autonomous compliance monitoring of non-functional properties (MB), pp. 795–798.
ICPC-2013-PruijtKB #analysis #architecture #dependence #on the- On the accuracy of Architecture Compliance Checking support Accuracy of dependency analysis and violation reporting (LP, CK, SB), pp. 172–181.
ICSM-2013-PruijtKB #architecture #case study #comparative #composition #semantics #tool support- Architecture Compliance Checking of Semantically Rich Modular Architectures: A Comparative Study of Tool Support (LP, CK, SB), pp. 220–229.
DUXU-NTE-2013-DuarteRTVTN #behaviour- Sense of Presence in a VR-Based Study on Behavioral Compliance with Warnings (ED, FR, LT, EV, JT, PN), pp. 362–371.
HIMI-D-2013-PietrasSHKSJLJ #usability- Usability Compliance Audit for Technology Intelligence Services (NP, MS, MH, JK, SKS, DHJ, SL, HJ), pp. 524–533.
CAiSE-2013-TaghiabadiFDA #requirements- Diagnostic Information for Compliance Checking of Temporal Compliance Requirements (ERT, DF, BFvD, WMPvdA), pp. 304–320.
EDOC-2013-LyMMRA #comparison #evaluation #framework #monitoring- A Framework for the Systematic Comparison and Evaluation of Compliance Monitoring Approaches (LTL, FMM, MM, SRM, WMPvdA), pp. 7–16.
REFSQ-2013-IngolfoSJSPM- Choosing Compliance Solutions through Stakeholder Preferences (SI, AS, IJ, AS, AP, JM), pp. 206–220.
SAC-2013-TranLZ #architecture #metadata #security- Derivation of domain-specific architectural knowledge views from governance and security compliance metadata (HT, IL, UZ), pp. 1728–1733.
ICST-2013-CompagnaGB #as a service #process #security #validation- Business Process Compliance via Security Validation as a Service (LC, PG, ADB), pp. 455–462.
IFM-2012-SchunselaarMS #declarative #modelling- Patterns for a Log-Based Strengthening of Declarative Compliance Models (DMMS, FMM, NS), pp. 327–342.
CHI-2012-MasliT #community #online- Evaluating compliance-without-pressure techniques for increasing participation in online communities (MM, LGT), pp. 2915–2924.
CHI-2012-TolmieBFBATFG #case study #experience #quote- “Act natural”: instructions, compliance and accountability in ambulatory experiences (PT, SB, MF, PB, MA, NT, JRF, GG), pp. 1519–1528.
CAiSE-2012-AbdullahSI #comprehension #modelling #ontology- A Compliance Management Ontology: Developing Shared Understanding through Models (NSA, SWS, MI), pp. 429–444.
CAiSE-2012-BinderDDDFGGHHRRW #case study #clustering #experience #on the #process- On Analyzing Process Compliance in Skin Cancer Treatment: An Experience Report from the Evidence-Based Medical Compliance Cluster (EBMC2) (MB, WD, GD, RD, KAF, WG, WG, KH, MH, SRM, CR, SW), pp. 398–413.
CAiSE-2012-KaragiannisMM #approach #evaluation #heatmap #metamodelling- Compliance Evaluation Featuring Heat Maps (CE-HM): A Meta-Modeling-Based Approach (DK, CM, AM), pp. 414–428.
KDD-2012-Williams- Ensembles and model delivery for tax compliance (GW), p. 1003.
RE-2012-MaxwellAS #evolution #predict #requirements- Managing changing compliance requirements by predicting regulatory evolution (JCM, AIA, PPS), pp. 101–110.
RE-2012-TawhidBCAMSABR #security #towards- Towards outcome-based regulatory compliance in aviation security (RT, EB, NC, MA, GM, AS, DA, SAB, GR), pp. 267–272.
REFSQ-2012-NekviMFB- Impediments to Requirements-Compliance (MRIN, NHM, RF, BB), pp. 30–36.
CAiSE-2011-AwadGTW #approach #process #synthesis- An Iterative Approach for Business Process Template Synthesis from Compliance Rules (AA, RG, JT, MW), pp. 406–421.
CAiSE-2011-VicenteS #concept- A Conceptual Model for Integrated Governance, Risk and Compliance (PV, MMdS), pp. 199–213.
EDOC-2011-KharbiliMKP #modelling #named- CoReL: Policy-Based and Model-Driven Regulatory Compliance Management (MEK, QM, PK, EP), pp. 247–256.
EDOC-2011-SchleicherFGLNSS #strict- Compliance Domains: A Means to Model Data-Restrictions in Cloud Environments (DS, CF, SG, FL, AN, PS, DS), pp. 257–266.
CASE-2010-LiYG #learning- Learning compliance control of robot manipulators in contact with the unknown environment (YL, CY, SSG), pp. 644–649.
ICSM-2010-ZhangSZ #automation- Automatic checking of license compliance (HZ, BS, LZ), pp. 1–3.
CHI-2010-CramerESGW #mobile #social #trust- Trying too hard: effects of mobile agents’ (Inappropriate) social expressiveness on trust, affect and compliance (HSMC, VE, TvS, MG, BJW), pp. 1471–1474.
CAiSE-2010-AbdullahSI #challenge #information management #research- Emerging Challenges in Information Systems Research for Regulatory Compliance Management (NSA, SWS, MI), pp. 251–265.
CAiSE-2010-LyRD #design #graph #information management #verification- Design and Verification of Instantiable Compliance Rule Graphs in Process-Aware Information Systems (LTL, SRM, PD), pp. 9–23.
CAiSE-2010-WeidlichPDM #behaviour #metric #process- Process Compliance Measurement Based on Behavioural Profiles (MW, AP, ND, JM), pp. 499–514.
SAC-2010-AraujoSCA #process #validation- A method for validating the compliance of business processes to business rules (BdMA, EAS, ALC, AJA), pp. 145–149.
SAC-2010-Herold #architecture #component- Checking architectural compliance in component-based systems (SH), pp. 2244–2251.
CSMR-2009-Chikofsky #architecture #process #using- Using the ACART Process for Architecture Compliance (EJC), pp. 313–314.
EDOC-2009-DeitersDHR #architecture #enterprise #rule-based- Rule-Based Architectural Compliance Checks for Enterprise Architecture Management (CD, PD, SH, AR), pp. 183–192.
CIKM-2009-SayeedSDHMR #analysis #documentation #metric #similarity- Characteristics of document similarity measures for compliance analysis (ABS, SS, YD, RH, RM, NR), pp. 1207–1216.
RE-2009-GhanavatiAP #analysis #evaluation- Compliance Analysis Based on a Goal-oriented Requirement Language Evaluation Methodology (SG, DA, LP), pp. 133–142.
DATE-2008-FreuerJGN #constraints #design #higher-order #on the #verification- On the Verification of High-Order Constraint Compliance in IC Design (JBF, GJ, JG, WN), pp. 26–31.
CSMR-2008-KnodelMHM #architecture #case study #experience #industrial- Architecture Compliance Checking — Experiences from Successful Technology Transfer to Industry (JK, DM, UH, GM), pp. 43–52.
ICSM-2008-KnodelMR #architecture #empirical #feedback- Constructive architecture compliance checking — an experiment on support by live feedback (JK, DM, DR), pp. 287–296.
EDOC-2008-Fabry #database #requirements- Database Vault: Enforcing Separation of Duties to Meet Regulatory Compliance Requirements (HWF).
RE-2008-BreauxABD #case study #industrial #requirements- Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility (TDB, AIA, KB, MD), pp. 43–52.
RE-2008-RifautD #assessment #framework #quality #requirements #using- Using Goal-Oriented Requirements Engineering for Improving the Quality of ISO/IEC 15504 based Compliance Assessment Frameworks (AR, ED), pp. 33–42.
ICSE-2008-BunyakiatiFSC #standard #testing #uml #using- Using JULE to generate a compliance test suite for the UML standard (PB, AF, JS, CC), pp. 827–830.
ICSE-2008-HohnJ #automation #modelling #named- Rubacon: automated support for model-based compliance engineering (SH, JJ), pp. 875–878.
WICSA-2007-ClercLV #architecture #development #multi- Assessing a Multi-Site Development Organization for Architectural Compliance (VC, PL, HvV), p. 10.
WICSA-2007-KnodelP #architecture #comparison- A Comparison of Static Architecture Compliance Checking Approaches (JK, DP), p. 12.
DAC-2007-AdirAFJP #architecture #framework #validation- A Framework for the Validation of Processor Architecture Compliance (AA, SA, LF, IJ, OP), pp. 902–905.
DATE-2007-MarianiBC #design #using- Using an innovative SoC-level FMEA methodology to design in compliance with IEC61508 (RM, GB, FC), pp. 492–497.
CAiSE-2007-GhanavatiAP #framework #towards- Towards a Framework for Tracking Legal Compliance in Healthcare (SG, DA, LP), pp. 218–232.
EDOC-2007-YipPR #ontology- Rules and Ontology in Compliance Management (FY, NP, PR), pp. 435–442.
RE-2007-KaragiannisMS- Business Process-Based Regulation Compliance: The Case of the Sarbanes-Oxley Act (DK, JM, MS), pp. 315–321.
EDOC-2006-GovernatoriMS #contract #process- Compliance checking between business processes and business contracts (GG, ZM, SWS), pp. 221–232.
ICEIS-DISI-2006-MoallaBNOT #industrial #information management- Data Compliance in Pharmaceutical Industry — Interoperability to Align Business and Information Systems (NM, AB, GN, YO, NT), pp. 79–86.
ICEIS-J-2006-MoallaBNO #industrial #information management #towards- Toward Data Compliance in Vaccine Industry: Interoperability to Align Business and Information Systems (NM, AB, GN, YO), pp. 98–111.
RE-2006-BreauxVA #requirements #towards- Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations (TDB, MWV, AIA), pp. 46–55.
ICLP-2006-SzaboS #prolog #standard- Improving the ISO Prolog Standard by Analyzing Compliance Test Results (PS, PS), pp. 257–269.
VLDB-2004-AgrawalBFKRS #database- Auditing Compliance with a Hippocratic Database (RA, RJBJ, CF, JK, RR, RS), pp. 516–527.
ICEIS-2002-CheungCD #design #process #standard- Supporting Engineering Design Process with an Intelligent Compliance Agent: A Way to Ensure a Standard Complied Process (LYCC, PWHC, RD), pp. 341–349.
ICSE-2002-AtiyaK #concurrent #verification- A compliance notation for verifying concurrent systems (DMA, SK), pp. 731–732.
TestCom-2002-Kone #protocol- Compliance of Wireless Application Protocols (OK), pp. 129–138.
ICSM-1999-InteresseD #case study #experience #verification- Experience Paper: Beyond Year 2000 Remediation: The Compliance Verification: A Case Study (MI, RD), pp. 155–160.
ICSM-1999-KloschE #case study #challenge #evolution #experience- Experience Paper: Challenges and Experiences in Managing Major Software Evolution Endeavours Such as Euro Conversion or Y2000 Compliance (RK, WE), pp. 161–166.
ICSM-1997-Reed- DLA’S YEAR 2000 REMEDIATION PROGRAM: Managing Organization-Wide Conversion and Compliance (SJR), pp. 198–205.
OOPSLA-1996-Yelland #case study #design pattern #framework- Creating Host Compliance in a Portable Framework: A Study in the Use of Existing Design Patterns (PMY), pp. 18–29.
ICSE-1996-SefikaSC #design #modelling #monitoring- Monitoring Compliance of a Software System with Its High-Level Design Models (MS, AS, RHC), pp. 387–396.
DAC-1977-GodoyFB #automation #design #logic #testing- Automatic checking of logic design structures For compliance with testability ground rules (HCG, GBF, PSB), pp. 469–478.