Abstract is missing.
- A Petri Net Model of Process Platform-based Production ConfigurationLinda L. Zhang, Brian Rodrigues. 5-12
- A Simulation Model for Managing Engineering Changes Along with New Product DevelopmentWeilin Li, Young B. Moon. 13-18
- Security Analysis of the German Electronic Health Card s Peripheral PartsAli Sunyaev, Alexander Kaletsch, Christian Mauro, Helmut Krcmar. 19-26
- An Approach to Model-driven Development Process SpecificationRita Suzana Pitangueira Maciel, Bruno Carreiro da Silva, Ana PatrÃcia Fontes Magalhães, Nelson Souto Rosa. 27-32
- Ontology Mapping based on Association Rule MiningChristos Tatsiopoulos, Basilis Boutsinas. 33-40
- Evaluation of Case Tool Methods and Processes - An Analysis of Eight Open-source CASE ToolsStefan Biffl, Christoph Ferstl, Christian Höllwieser, Thomas Moser. 41-48
- Security and Dependability in Ambient Intelligence Scenarios - The Communication PrototypeAlvaro Armenteros, Antonio Muñoz, Antonio Maña, Daniel Serrano. 49-56
- A Method for Rewriting Legacy Systems using Business Process Management TechnologyGleison Samuel do Nascimento, Cirano Iochpe, Lucinéia Heloisa Thom, Manfred Reichert. 57-62
- A Comprehensive Approach for Solving Policy HeterogeneityRodolfo Ferrini, Elisa Bertino. 63-68
- Correlation of Context Information for Mobile ServicesStephan Haslinger, Miguel Jiménez, Schahram Dustdar. 69-76
- Business Process Re-engineering in Supply Chains Examining the Case of the Expanding Halal IndustryMohammed Belkhatir, Shalini Bala, Noureddine Belkhatir. 77-82
- Discovery and Analysis of Activity Pattern Co-occurrences in Business Process ModelsJean Michel Lau, Cirano Iochpe, Lucinéia Heloisa Thom, Manfred Reichert. 83-88
- Modelling, Analysis and Improvement of Mobile Business Processes with the MPL MethodVolker Gruhn, André Köhler. 89-94
- RFID in the Supply Chain: How to Obtain a Positive ROI - The Case of Gerry WeberChristoph Goebel, Christoph Tribowski, Oliver Günther, Ralph Tröger, Roland Nickerl. 95-102
- Uncertainties Management Framework - Foundational PrinciplesDeniss Kumlander. 103-108
- A Rule-based Approach and Framework for Managing Best Practices - An XML-based Management using Pure Database System UtilitiesEssam Mansour, Hagen Höpfner. 109-115
- Enterprise System Development with Invariant Preserving - A Mathematical Approach by the Homotopy Lifting and Extension PropertiesKenji Ohmori, Tosiyasu L. Kunii. 116-123
- Automatic Generation of Test Cases in Software Product LinesPedro Reales Mateo, Macario Polo, Beatriz Pérez Lamancha. 124-130
- Reasoning about Customer Needs in Multi-supplier ICT Service Bundles using Decision ModelsSybren de Kinderen, Jaap Gordijn, Hans Akkermans. 131-136
- An Event Structure based Coordination Model for Collaborative SessionsKamel Barkaoui, Chafia Bouanaka, José MartÃn Molina Espinosa. 137-143
- Mining and Modeling Decision Workflows from DSS User Activity LogsRazvan Petrusel. 144-149
- Information Architecture of Fractal Information SystemsJanis Grabis, Marite Kirikova, Janis Vanags. 150-155
- A Process for Multi-agent Domain and Application Engineering - The Domain Analysis and Application Requirements Engineering PhasesAdriana Leite, Rosario Girardi. 156-161
- A Revised Modelling Quality FrameworkPieter Joubert, Stefanie Louw, Carina De Villiers, Jan Kroeze. 162-167
- Layered Process Models - Analysis and Implementation (using MDA Principles)Samia Oussena, Balbir S. Barn. 168-175
- Efficient Data Structures for Local Inconsistency Detection in Firewall ACL UpdatesSergio Pozo Hidalgo, Rafael M. Gasca, F. T. de la Rosa. 176-181
- Deriving Canonical Business Object Operation Nets from Process ModelsZhaoxia Wang, Jianmin Wang, Lijie Wen, Yingbo Liu. 182-187
- A Vision for Agile Model-driven Enterprise Information SystemsN. R. T. P. van Beest, Nicolae B. Szirbik, Johan C. Wortmann. 188-193
- Specifying and Compiling High Level Financial Fraud Policies into StreamSQLMichael Edward Edge, Pedro R. Falcone Sampaio, Oliver Philpott, Mohammed Choudhary. 194-199
- Robust Approach Towards Context Dependant Information Sharing in Distributed EnvironmentsJenny Lundberg, Rune Gustavsson. 200-205
- Using BPMN and Tracing for Rapid Business Process Prototyping EnvironmentsAlessandro Ciaramella, Mario G. C. A. Cimino, Beatrice Lazzerini, Francesco Marcelloni. 206-212
- Information Systems Security based on Business Process ModelingJoseph Barjis. 213-218
- A Service Oriented Engineering Approach to Enhance the Development of Automation and Control SystemsDavid Hästbacka, Seppo Kuikka. 219-224
- Applying an Event-based Approach for Detecting Requirements InteractionEdgar Sarmiento, Marcos R. S. Borges, Maria Luiza Machado Campos. 225-230
- An Evolutionary Approach for Quality Models IntegrationRodrigo Santos de Espindola, Jorge Luis Nicolas Audy. 231-236
- A Socio-semantic Approach to the Conceptualisation of Domains, Processes and Tasks in Large ProjectsCarla Pereira, Cristóvão Sousa, António Lucas Soares. 237-242
- Enterprise Ontology Management - An Approach based on Information ArchitectureLeonardo Azevedo, Sean W. M. Siqueira, Fernanda Araujo Baião, Jairo de Souza, Mauro Lopes, Claudia Cappelli, Flávia Maria Santoro. 243-248
- Finding Reusable Business Process Models based on Structural MatchingHan G. Woo. 249-255
- Method Manual based Process Generation and ValidationPeter Killisperger, Georg Peters, Markus Stumptner, Thomas Stückl. 256-261
- Reverse Engineering a Domain Ontology to Uncover Fundamental Ontological Distinctions - An Industrial Case Study in the Domain of Oil and Gas Production and ExplorationMauro Lopes, Giancarlo Guizzardi, Fernanda Araujo Baião, Ricardo de Almeida Falbo. 262-267
- A BPMN based Secure Workflow ModelLi Peng. 268-272
- Semiotics - An Asset for Understanding Information Systems CommunicationPedro Azevedo Rocha, Ângela Lacerda Nobre. 273-278
- Enhancing High Precision by Combining Okapi BM25 with Structural Similarity in an Information Retrieval SystemYaël Champclaux, Taoufiq Dkaki, Josiane Mothe. 279-285
- Towards Integrating Perspectives and Abstraction Levels in Business Process ModelingIvan Markovic, Florian Hasibether. 286-291
- Keeping the Rationale of IS Requirements using Organizational Business ModelsJuliana Jansen Ferreira, Victor Manaia Chaves, Renata Mendes de Araujo, Fernanda Araujo Baião. 292-297
- An Effective Process Modelling TechniqueNadja Damij. 298-303
- A Kind of Information Content Applied for the Handicapped and Dementia Situation Considering Philosophical ElementsMasahiro Aruga, Shinwu Liu, Shuichi Kato. 307-312
- Evaluation of UML in Practice - Experiences in a Traffic Management Systems CompanyMichel dos Santos Soares, Jos L. M. Vrancken. 313-319
- A Comparison of Security Safeguard Selection MethodsThomas Neubauer. 320-323
- Privacy for RFID-enabled Distributed Applications - Design NotesMikaël Ates, Jacques Fayolle, Christophe Gravier, Jérémy Lardon, Rahul Garg. 324-328
- Brain Physiological Characteristic Analysis for Software Analysis Support EnvironmentsMikio Ohki, Haruki Murase. 329-337
- Modular Behaviour Modelling of Service Providing Business ProcessesElla E. Roubtsova, Lex Wedemeijer, Karel Lemmen, Ashley T. McNeile. 338-341
- The Patterns for Information System SecurityDiego Abbo, Lily Sun. 342-346
- Aligning Goal-Oriented Requirements Engineering and Model-Driven DevelopmentFernanda M. R. Alencar, Oscar Pastor, Beatriz MarÃn, Giovanni Giachetti, Jaelson Castro. 347-350
- VAODA - A Viewpoint and Aspect-Oriented Domain Analysis ApproachAntónio Pedro Rodrigues, João Araújo. 351-354
- Towards a Unified Domain for Fuzzy Temporal DatabasesM. Carmen Garrido, Nicolás MarÃn, Olga Pons. 355-358
- Process Institutionalization using Software Process LinesTomás MartÃnez-Ruiz, Félix GarcÃa Carballeira, Mario Piattini. 359-362
- A Systematic Literature Review of Requirements Engineering in Distributed Software Development EnvironmentsThaÃs Ebling, Jorge Luis Nicolas Audy, Rafael Prikladnicki. 363-366
- Applicability of ISO/IEC 9126 for the Selection of Floss ToolsMarÃa A. Pérez, Kenyer DomÃnguez, Edumilis Maria Méndez, Luis Eduardo Mendoza. 367-371
- A Workflow Language for the Experimental SciencesYuan Lin, Thérèse Libourel, Isabelle Mougenot. 372-375
- Using Ontologies with Hippocratic Databases - A Model for Protecting Personal Information PrivacyEsraa Omran, Albert Bokma, Shereef Abu Al-Maati. 376-382
- Linking IT and Business Processes for Alignment - A Meta Model based ApproachMatthias Goeken, Jan C. Pfeiffer, Wolfgang Johannsen. 383-388
- Modeling with BPMN and Chorda: A Top-Down, Data-Driven Methodology and ToolAndrea Catalano, Matteo Magnani, Danilo Montesi. 389-392
- Proactive Insider-threat Detection - Against Confidentiality in Sensitive Pervasive ApplicationsJoon S. Park, Jaeho Yim, Jason Hallahan. 393-398
- An Integration-oriented Model for Application Lifecycle ManagementGuenter Pirklbauer, Rudolf Ramler, Rene Zeilinger. 399-402
- Challenges and Perspectives in the Deployment of Distributed Components-based SoftwareMariam Dibo, Noureddine Belkhatir. 403-406
- Database Marketing Process Supported by Ontologies - System Architecture ProposalFilipe Mota Pinto, Alzira Ascensão Marques, Manuel Filipe Santos. 407-410
- On Technology Innovation - A Community Succession Model for Software EnterpriseQianhui Liang, Weihui Dai. 411-415
- Modelling Location-aware Behaviour in Web-GIS using AspectsAna Oliveira, Matias Urbieta, João Araújo, Armanda Rodrigues, Ana Moreira, Silvia E. Gordillo, Gustavo Rossi. 416-419
- Instructional Design for Java Enterprise Component TechnologyMarco Marcellis, Ella E. Roubtsova, Bert Hoogveld. 420-422
- Innovative Health Care Channels - Towards Declarative Electronic Decision Support Systems Focusing on Patient SecurityKerstin Ã…dahl, Jenny Lundberg, Rune Gustavsson. 423-426