Abstract is missing.
- Analysis and Prediction of Design Model Evolution Using Time SeriesHamed Shariat Yazdi, Mahnaz Mirbolouki, Pit Pietsch, Timo Kehrer, Udo Kelter. 1-15 [doi]
- An Evolutionary Improvement of the Mahalanobis - Taguchi Strategy and Its Application to Intrusion DetectionDimitris Liparas, Evangelia Pantraki. 16-30 [doi]
- Zero-Knowledge Private Computation of Node Bridgeness in Social NetworksMaryam Shoaran, Alex Thomo. 31-43 [doi]
- Valuation and Selection of OSS with Real OptionsAndroklis Mavridis. 44-52 [doi]
- State of the Art in Context Modelling - A Systematic Literature ReviewHasan Koç, Erik Hennig, Stefan Jastram, Christoph Starke. 53-64 [doi]
- On the Applicability of Concepts from Variability Modelling in Capability Modelling: Experiences from a Case in Business Process OutsourcingKurt Sandkuhl, Hasan Koç. 65-76 [doi]
- Capability Sourcing Modeling - A High-Level Conceptualization Based on Service-Dominant LogicLaleh Rafati, Geert Poels. 77-87 [doi]
- Capability-Based Business Model TransformationMartin Henkel, Ilia Bider, Erik Perjons. 88-99 [doi]
- Capability-Driven Development of a SOA Platform: A Case StudySergio España, Tania González, Janis Grabis, Lauma Jokste, Raúl Juanes, Francisco Valverde. 100-111 [doi]
- Modeling Enterprise Capabilities with i*: Reasoning on AlternativesMohammad Hossein Danesh, Eric Yu. 112-123 [doi]
- Service Functioning Mode in Variability ModelPeteris Rudzajs, Marite Kirikova. 124-135 [doi]
- Towards a Computer-Aided Problem-Oriented Variability Requirements Engineering MethodAzadeh Alebrahim, Stephan Faßbender, Martin Filipczyk, Michael Goedicke, Maritta Heisel, Marco Konersmann. 136-147 [doi]
- An Outlook on Patterns as an Aid for Business and IT Alignment with CapabilitiesJanis Stirna, Kurt Sandkuhl. 148-158 [doi]
- Low-Cost Eye-Trackers: Useful for Information Systems Research?Stefan Zugal, Jakob Pinggera. 159-170 [doi]
- Supporting BPMN Model Creation with Routing PatternsIdan Wolf, Pnina Soffer. 171-181 [doi]
- Coupling Elements of a Framework for Cognitive Matchmaking with Enterprise ModelsSietse Overbeek. 182-193 [doi]
- Investigating Differences between Graphical and Textual Declarative Process ModelsCornelia Haisjackl, Stefan Zugal. 194-206 [doi]
- Reducing Technical Debt: Using Persuasive Technology for Encouraging Software Developers to Document Code - (Position Paper)Yulia Shmerlin, Doron Kliger, Hayim Makabee. 207-212 [doi]
- Conceptual Understanding of Conceptual Modeling Concepts: A Longitudinal Study among Students Learning to ModelDirk van der Linden, Henderik Alex Proper, Stijn Hoppenbrouwers. 213-218 [doi]
- What Do Software Architects Think They (Should) Do? - Research in ProgressSofia Sherman, Naomi Unkelos-Shpigel. 219-225 [doi]
- Towards Semantic Collective Awareness Platforms for Business InnovationFabrizio Smith, Emanuele Storti, Francesco Taglino. 226-237 [doi]
- Leveraging User Inspiration with Microblogging-Driven Exploratory SearchMaria Taramigkou, Fotis Paraskevopoulos, Efthimios Bothos, Dimitris Apostolou, Gregoris Mentzas. 238-249 [doi]
- System Architecture of the BIVEE Platform for Innovation and Production ImprovementMauro Isaja. 250-255 [doi]
- Cooperative Decision Making in Virtual EnterprisesNesat Efendioglu, Vedran Hrgovcic, Ronald Quirchmayr, Robert Woitsch. 256-267 [doi]
- A Methodology for the Set-Up of a Virtual Innovation Factory PlatformCristina Cristalli, Daniela Isidori. 268-273 [doi]
- Data Mart Reconciliation in Virtual Innovation FactoriesClaudia Diamantini, Domenico Potena, Emanuele Storti. 274-285 [doi]
- Requirements Refinement and Exploration of Architecture for Security and Other NFRsTakao Okubo, Nobukazu Yoshioka, Haruhiko Kaiya. 286-298 [doi]
- Cloud Forensics Solutions: A ReviewStavros Simou, Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis. 299-309 [doi]
- Resolving Policy Conflicts - Integrating Policies from Multiple AuthorsKaniz Fatema, David W. Chadwick. 310-321 [doi]
- Evolving Computational Intelligence System for Malware DetectionKonstantinos Demertzis, Lazaros S. Iliadis. 322-334 [doi]
- Lightweight Formal Verification in Real World, A Case StudyAndrea S. Atzeni, Tao Su, Teodoro Montanaro. 335-342 [doi]
- Security Requirements Analysis Using Knowledge in CAPECHaruhiko Kaiya, Sho Kono, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki, Kenji Kaijiri. 343-348 [doi]