BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
architectur (15)
process (15)
base (14)
check (12)
busi (12)

Stem complianc$ (all stems)

82 papers:

DACDAC-2015-ShererRO #functional #safety
Ensuring functional safety compliance for ISO 26262 (ADS, JR, RO), p. 3.
ICGTICGT-2015-KwantesGKR #modelling #process #towards #verification
Towards Compliance Verification Between Global and Local Process Models (PMK, PVG, JK, AR), pp. 221–236.
CHICHI-2015-KonradBCTNDPW #adaptation #automation #reduction
Finding the Adaptive Sweet Spot: Balancing Compliance and Achievement in Automated Stress Reduction (AK, VB, NC, ST, LN, HD, PP, SW), pp. 3829–3838.
MoDELSMoDELS-2015-SunkleKK #case study #modelling
Model-driven regulatory compliance: A case study of “Know Your Customer” regulations (SS, DK, VK), pp. 436–445.
SACSAC-2015-AwadBESAS #anti #approach #detection #process #runtime
Runtime detection of business process compliance violations: an approach based on anti patterns (AA, AB, AE, RES, AA, SS), pp. 1203–1210.
SACSAC-2015-OjameruayeB #analysis #framework
A risk — aware framework for compliance goal-obstacle analysis (BO, RB), pp. 1401–1402.
ESEC-FSEESEC-FSE-2015-GhaisasMBGKV #automation #security #towards
Towards automating the security compliance value chain (SG, MM, BB, AG, RK, HMV), pp. 1014–1017.
VMCAIVMCAI-2015-CortesiFPT #mobile #policy #privacy #semantics #verification
Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications (AC, PF, MP, OT), pp. 61–79.
ASEASE-2014-BurgDMDGH #consistency #nondeterminism #process
Tracing software build processes to uncover license compliance inconsistencies (SvdB, ED, SM, JD, DMG, AH), pp. 731–742.
ASEASE-2014-PruijtKWB #architecture #named #set
HUSACCT: architecture compliance checking with rich sets of module and rule types (LJP, CK, JMvdW, SB), pp. 851–854.
EDOCEDOC-2014-KoetterKWFL #requirements
Integrating Compliance Requirements across Business and IT (FK, MK, AW, CF, FL), pp. 218–225.
ICEISICEIS-v3-2014-AlvesVS #analysis #architecture
Architecture Principles Compliance Analysis (JA, AV, PS), pp. 328–334.
RERE-2014-Buksa #process
Business processes and regulations compliance management technology (IB), pp. 489–493.
RERE-2014-GhanavatiRDA #multi
Goal-oriented compliance with multiple regulations (SG, AR, ED, DA), pp. 73–82.
RERE-2014-IngolfoSM #reasoning #requirements
Nòmos 3: Reasoning about regulatory compliance of requirements (SI, AS, JM), pp. 313–314.
REFSQREFSQ-2014-OjameruayeB #requirements #using
Systematic Elaboration of Compliance Requirements Using Compliance Debt and Portfolio Theory (BO, RB), pp. 152–167.
FSEFSE-2014-Brunink #monitoring #non-functional
Autonomous compliance monitoring of non-functional properties (MB), pp. 795–798.
ICPCICPC-2013-PruijtKB #analysis #architecture #dependence #on the
On the accuracy of Architecture Compliance Checking support Accuracy of dependency analysis and violation reporting (LP, CK, SB), pp. 172–181.
ICSMEICSM-2013-PruijtKB #architecture #case study #comparative #composition #semantics #tool support
Architecture Compliance Checking of Semantically Rich Modular Architectures: A Comparative Study of Tool Support (LP, CK, SB), pp. 220–229.
HCIDUXU-NTE-2013-DuarteRTVTN #behaviour
Sense of Presence in a VR-Based Study on Behavioral Compliance with Warnings (ED, FR, LT, EV, JT, PN), pp. 362–371.
HCIHIMI-D-2013-PietrasSHKSJLJ #usability
Usability Compliance Audit for Technology Intelligence Services (NP, MS, MH, JK, SKS, DHJ, SL, HJ), pp. 524–533.
CAiSECAiSE-2013-TaghiabadiFDA #requirements
Diagnostic Information for Compliance Checking of Temporal Compliance Requirements (ERT, DF, BFvD, WMPvdA), pp. 304–320.
EDOCEDOC-2013-LyMMRA #comparison #evaluation #framework #monitoring
A Framework for the Systematic Comparison and Evaluation of Compliance Monitoring Approaches (LTL, FMM, MM, SRM, WMPvdA), pp. 7–16.
REFSQREFSQ-2013-IngolfoSJSPM
Choosing Compliance Solutions through Stakeholder Preferences (SI, AS, IJ, AS, AP, JM), pp. 206–220.
SACSAC-2013-TranLZ #architecture #metadata #security
Derivation of domain-specific architectural knowledge views from governance and security compliance metadata (HT, IL, UZ), pp. 1728–1733.
ICSTICST-2013-CompagnaGB #as a service #process #security #validation
Business Process Compliance via Security Validation as a Service (LC, PG, ADB), pp. 455–462.
IFMIFM-2012-SchunselaarMS #declarative #modelling
Patterns for a Log-Based Strengthening of Declarative Compliance Models (DMMS, FMM, NS), pp. 327–342.
CHICHI-2012-MasliT #community #online
Evaluating compliance-without-pressure techniques for increasing participation in online communities (MM, LGT), pp. 2915–2924.
CHICHI-2012-TolmieBFBATFG #case study #experience #quote
“Act natural”: instructions, compliance and accountability in ambulatory experiences (PT, SB, MF, PB, MA, NT, JRF, GG), pp. 1519–1528.
CAiSECAiSE-2012-AbdullahSI #comprehension #modelling #ontology
A Compliance Management Ontology: Developing Shared Understanding through Models (NSA, SWS, MI), pp. 429–444.
CAiSECAiSE-2012-BinderDDDFGGHHRRW #case study #clustering #experience #on the #process
On Analyzing Process Compliance in Skin Cancer Treatment: An Experience Report from the Evidence-Based Medical Compliance Cluster (EBMC2) (MB, WD, GD, RD, KAF, WG, WG, KH, MH, SRM, CR, SW), pp. 398–413.
CAiSECAiSE-2012-KaragiannisMM #approach #evaluation #heatmap #metamodelling
Compliance Evaluation Featuring Heat Maps (CE-HM): A Meta-Modeling-Based Approach (DK, CM, AM), pp. 414–428.
KDDKDD-2012-Williams
Ensembles and model delivery for tax compliance (GW), p. 1003.
RERE-2012-MaxwellAS #evolution #predict #requirements
Managing changing compliance requirements by predicting regulatory evolution (JCM, AIA, PPS), pp. 101–110.
RERE-2012-TawhidBCAMSABR #security #towards
Towards outcome-based regulatory compliance in aviation security (RT, EB, NC, MA, GM, AS, DA, SAB, GR), pp. 267–272.
REFSQREFSQ-2012-NekviMFB
Impediments to Requirements-Compliance (MRIN, NHM, RF, BB), pp. 30–36.
CAiSECAiSE-2011-AwadGTW #approach #process #synthesis
An Iterative Approach for Business Process Template Synthesis from Compliance Rules (AA, RG, JT, MW), pp. 406–421.
CAiSECAiSE-2011-VicenteS #concept
A Conceptual Model for Integrated Governance, Risk and Compliance (PV, MMdS), pp. 199–213.
EDOCEDOC-2011-KharbiliMKP #modelling #named
CoReL: Policy-Based and Model-Driven Regulatory Compliance Management (MEK, QM, PK, EP), pp. 247–256.
EDOCEDOC-2011-SchleicherFGLNSS #strict
Compliance Domains: A Means to Model Data-Restrictions in Cloud Environments (DS, CF, SG, FL, AN, PS, DS), pp. 257–266.
CASECASE-2010-LiYG #learning
Learning compliance control of robot manipulators in contact with the unknown environment (YL, CY, SSG), pp. 644–649.
ICSMEICSM-2010-ZhangSZ #automation
Automatic checking of license compliance (HZ, BS, LZ), pp. 1–3.
CHICHI-2010-CramerESGW #mobile #social #trust
Trying too hard: effects of mobile agents’ (Inappropriate) social expressiveness on trust, affect and compliance (HSMC, VE, TvS, MG, BJW), pp. 1471–1474.
CAiSECAiSE-2010-AbdullahSI #challenge #information management #research
Emerging Challenges in Information Systems Research for Regulatory Compliance Management (NSA, SWS, MI), pp. 251–265.
CAiSECAiSE-2010-LyRD #design #graph #information management #verification
Design and Verification of Instantiable Compliance Rule Graphs in Process-Aware Information Systems (LTL, SRM, PD), pp. 9–23.
CAiSECAiSE-2010-WeidlichPDM #behaviour #metric #process
Process Compliance Measurement Based on Behavioural Profiles (MW, AP, ND, JM), pp. 499–514.
SACSAC-2010-AraujoSCA #process #validation
A method for validating the compliance of business processes to business rules (BdMA, EAS, ALC, AJA), pp. 145–149.
SACSAC-2010-Herold #architecture #component
Checking architectural compliance in component-based systems (SH), pp. 2244–2251.
CSMRCSMR-2009-Chikofsky #architecture #process #using
Using the ACART Process for Architecture Compliance (EJC), pp. 313–314.
EDOCEDOC-2009-DeitersDHR #architecture #enterprise #rule-based
Rule-Based Architectural Compliance Checks for Enterprise Architecture Management (CD, PD, SH, AR), pp. 183–192.
CIKMCIKM-2009-SayeedSDHMR #analysis #documentation #metric #similarity
Characteristics of document similarity measures for compliance analysis (ABS, SS, YD, RH, RM, NR), pp. 1207–1216.
RERE-2009-GhanavatiAP #analysis #evaluation
Compliance Analysis Based on a Goal-oriented Requirement Language Evaluation Methodology (SG, DA, LP), pp. 133–142.
DATEDATE-2008-FreuerJGN #constraints #design #higher-order #on the #verification
On the Verification of High-Order Constraint Compliance in IC Design (JBF, GJ, JG, WN), pp. 26–31.
CSMRCSMR-2008-KnodelMHM #architecture #case study #experience #industrial
Architecture Compliance Checking — Experiences from Successful Technology Transfer to Industry (JK, DM, UH, GM), pp. 43–52.
ICSMEICSM-2008-KnodelMR #architecture #empirical #feedback
Constructive architecture compliance checking — an experiment on support by live feedback (JK, DM, DR), pp. 287–296.
EDOCEDOC-2008-Fabry #database #requirements
Database Vault: Enforcing Separation of Duties to Meet Regulatory Compliance Requirements (HWF).
RERE-2008-BreauxABD #case study #industrial #requirements
Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility (TDB, AIA, KB, MD), pp. 43–52.
RERE-2008-RifautD #assessment #framework #quality #requirements #using
Using Goal-Oriented Requirements Engineering for Improving the Quality of ISO/IEC 15504 based Compliance Assessment Frameworks (AR, ED), pp. 33–42.
ICSEICSE-2008-BunyakiatiFSC #standard #testing #uml #using
Using JULE to generate a compliance test suite for the UML standard (PB, AF, JS, CC), pp. 827–830.
ICSEICSE-2008-HohnJ #automation #modelling #named
Rubacon: automated support for model-based compliance engineering (SH, JJ), pp. 875–878.
WICSAWICSA-2007-ClercLV #architecture #development #multi
Assessing a Multi-Site Development Organization for Architectural Compliance (VC, PL, HvV), p. 10.
WICSAWICSA-2007-KnodelP #architecture #comparison
A Comparison of Static Architecture Compliance Checking Approaches (JK, DP), p. 12.
DACDAC-2007-AdirAFJP #architecture #framework #validation
A Framework for the Validation of Processor Architecture Compliance (AA, SA, LF, IJ, OP), pp. 902–905.
DATEDATE-2007-MarianiBC #design #using
Using an innovative SoC-level FMEA methodology to design in compliance with IEC61508 (RM, GB, FC), pp. 492–497.
CAiSECAiSE-2007-GhanavatiAP #framework #towards
Towards a Framework for Tracking Legal Compliance in Healthcare (SG, DA, LP), pp. 218–232.
EDOCEDOC-2007-YipPR #ontology
Rules and Ontology in Compliance Management (FY, NP, PR), pp. 435–442.
RERE-2007-KaragiannisMS
Business Process-Based Regulation Compliance: The Case of the Sarbanes-Oxley Act (DK, JM, MS), pp. 315–321.
EDOCEDOC-2006-GovernatoriMS #contract #process
Compliance checking between business processes and business contracts (GG, ZM, SWS), pp. 221–232.
ICEISICEIS-DISI-2006-MoallaBNOT #industrial #information management
Data Compliance in Pharmaceutical Industry — Interoperability to Align Business and Information Systems (NM, AB, GN, YO, NT), pp. 79–86.
ICEISICEIS-J-2006-MoallaBNO #industrial #information management #towards
Toward Data Compliance in Vaccine Industry: Interoperability to Align Business and Information Systems (NM, AB, GN, YO), pp. 98–111.
RERE-2006-BreauxVA #requirements #towards
Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations (TDB, MWV, AIA), pp. 46–55.
ICLPICLP-2006-SzaboS #prolog #standard
Improving the ISO Prolog Standard by Analyzing Compliance Test Results (PS, PS), pp. 257–269.
VLDBVLDB-2004-AgrawalBFKRS #database
Auditing Compliance with a Hippocratic Database (RA, RJBJ, CF, JK, RR, RS), pp. 516–527.
ICEISICEIS-2002-CheungCD #design #process #standard
Supporting Engineering Design Process with an Intelligent Compliance Agent: A Way to Ensure a Standard Complied Process (LYCC, PWHC, RD), pp. 341–349.
ICSEICSE-2002-AtiyaK #concurrent #verification
A compliance notation for verifying concurrent systems (DMA, SK), pp. 731–732.
ICTSSTestCom-2002-Kone #protocol
Compliance of Wireless Application Protocols (OK), pp. 129–138.
ICSMEICSM-1999-InteresseD #case study #experience #verification
Experience Paper: Beyond Year 2000 Remediation: The Compliance Verification: A Case Study (MI, RD), pp. 155–160.
ICSMEICSM-1999-KloschE #case study #challenge #evolution #experience
Experience Paper: Challenges and Experiences in Managing Major Software Evolution Endeavours Such as Euro Conversion or Y2000 Compliance (RK, WE), pp. 161–166.
ICSMEICSM-1997-Reed
DLA’S YEAR 2000 REMEDIATION PROGRAM: Managing Organization-Wide Conversion and Compliance (SJR), pp. 198–205.
OOPSLAOOPSLA-1996-Yelland #case study #design pattern #framework
Creating Host Compliance in a Portable Framework: A Study in the Use of Existing Design Patterns (PMY), pp. 18–29.
ICSEICSE-1996-SefikaSC #design #modelling #monitoring
Monitoring Compliance of a Software System with Its High-Level Design Models (MS, AS, RHC), pp. 387–396.
DACDAC-1977-GodoyFB #automation #design #logic #testing
Automatic checking of logic design structures For compliance with testability ground rules (HCG, GBF, PSB), pp. 469–478.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.