researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2009
2011
2015
2017
Filter by Tag
[+]
OR
AND
NOT
1
Meta-Environment
application framework
architecture
data-flow
design
e-science
meta-model
model-driven development
modeling
ontologies
ontology
open-source
peer-to-peer
process modeling
rule-based
source-to-source
systematic-approach
testing
transformation
web applications
Filter by Author
[+]
OR
AND
NOT
1
Abderrahmane Leshob
Alireza Pourshahid
Anis Boubaker
Basmah Almoaber
Benjamin Eze
Bernard Stepien
Daniel Amyot
Esma Aïmeur
Gilbert Babin
Gregory Richards
Hafedh Mili
Kamel Adi
Kem Z. K. Zhang
Liam Peyton
Luigi Logrippo
Michael Weiss
Morad Benyoucef
Petko Valtchev
Sesia J. Zhao
Thomas T. Tran
Filter by Top terms
[+]
OR
AND
NOT
1
access
agent
application
applications
approach
business
driven
e
framework
goal
information
model
modeling
process
systems
technologies
towards
user
using
web
MCETECH (mcetech)
Editions
Publications
Viewing Publication 1 - 86 from 86
2017
Supervised Methods to Support Online Scientific Data Triage
Hayda Almeida
,
Marc Queudot
,
Leila Kosseim
,
Marie-Jean Meurs
.
mcetech 2017
:
213-221
[doi]
Evaluating the Potential of Technology in Justice Systems Using Goal Modeling
Sanaa A. Alwidian
,
Daniel Amyot
,
Gilbert Babin
.
mcetech 2017
:
185-202
[doi]
Towards an Adaptive Learning Framework for MOOCs
Soufiane Ardchir
,
Mohamed Amine Talhaoui
,
Mohamed Azzouazi
.
mcetech 2017
:
236-251
[doi]
Acting as a Trustee for Internet of Agents in the Absence of Explicit Feedback
Abdullah Aref
,
Thomas Tran
.
mcetech 2017
:
3-23
[doi]
Reflex-SMAS, a Complex Adaptive System: An Empirical Evaluation
Hicham Assoudi
,
Hakim Lounis
.
mcetech 2017
:
300-318
[doi]
E-Technologies: Embracing the Internet of Things - 7th International Conference, MCETECH 2017, Ottawa, ON, Canada, May 17-19, 2017, Proceedings
Esma Aïmeur
,
Umar Ruhi
,
Michael Weiss
, editors,
Volume 289 of
Lecture Notes in Business Information Processing
,
2017.
[doi]
Activity-based Process Integration in Healthcare with the User Requirements Notation
Malak Baslyman
,
Basmah Almoaber
,
Daniel Amyot
,
El Mostafa Bouattane
.
mcetech 2017
:
151-169
[doi]
Insider Threat Likelihood Assessment for Flexible Access Control
Sofiene Boulares
,
Kamel Adi
,
Luigi Logrippo
.
mcetech 2017
:
77-95
[doi]
A Virtual Patient Navigation Application for Lung Cancer Assessment Patients
Gursimran Singh Chandhoke
,
Ajaydeep Singh Grewal
,
Venus Pathak
,
Simrandeep Singh
,
Mir Kamyar Ziabari
,
Daniel Amyot
,
Hussein Mouftah
,
Wojtek Michalowski
,
Michael Fung Kee Fung
,
Jennifer Smylie
,
Salome Shin
.
mcetech 2017
:
255-272
[doi]
An OLAP Rule Environment for Reactive Performance Monitoring
Katherine Chengli
,
Liam Peyton
.
mcetech 2017
:
205-212
[doi]
A New Scalable and Performance-Enhancing Bootstrap Aggregating Scheme for Variables Selection - Taking Real-World Web Services Resources as a Case
Choukri Djellali
,
Mehdi Adda
.
mcetech 2017
:
222-235
[doi]
Review of Existing Analysis Tools for SELinux Security Policies: Challenges and a Proposed Solution
Amir Eaman
,
Bahman Sistany
,
Amy P. Felty
.
mcetech 2017
:
116-135
[doi]
A Business Process Re-Engineering Approach to Transform BPMN Models to Software Artifacts
Javier Gonzalez-Huerta
,
Anis Boubaker
,
Hafedh Mili
.
mcetech 2017
:
170-184
[doi]
E-Payment Plan: A Conditional Multi-payment Scheme Based on User Personalization and Plan Agreement
Ghada El Haddad
,
Hicham Hage
,
Esma Aïmeur
.
mcetech 2017
:
285-299
[doi]
Privacy Preserving Discovery of Nearby-Friends
Maryam Hezaveh
,
Carlisle Adams
.
mcetech 2017
:
41-55
[doi]
Compliance Verification Algorithm for Computer Systems Security Policies
Liviu Pene
,
Lamia Hamza
,
Kamel Adi
.
mcetech 2017
:
96-115
[doi]
A Supervised Approach for Spam Detection Using Text-Based Semantic Representation
Nadjate Saidani
,
Kamel Adi
,
Mouhand Saïd Allili
.
mcetech 2017
:
136-148
[doi]
Responsiveness to Persuasive Strategies at the Workplace: A Case Study
Humu-Haida Selassie
,
Kiemute Oyibo
,
Julita Vassileva
.
mcetech 2017
:
273-284
[doi]
Integrating Access Control Obligations in the Session Initiation Protocol for Pervasive Computing Environments
Hassan Sharghi
,
Ramiro Liscano
.
mcetech 2017
:
24-40
[doi]
AHL: Model-Driven Engineering of Android Applications with BLE Peripherals
Pedram Veisi
,
Eleni Stroulia
.
mcetech 2017
:
56-74
[doi]
2015
Information Technology Artifacts in the Regulatory Compliance of Business Processes: A Meta-Analysis
Okhaide Akhigbe
,
Daniel Amyot
,
Gregory Richards
.
mcetech 2015
:
89-104
[doi]
A Trust Certificate Model for Multi-agent Systems
Basmah Almoaber
,
Thomas Tran
.
mcetech 2015
:
166-179
[doi]
Coping with Uncertainty in Schema Matching: Bayesian Networks and Agent-Based Modeling Approach
Hicham Assoudi
,
Hakim Lounis
.
mcetech 2015
:
53-67
[doi]
Assessing the Potential of RFID Technologies on the Productivity of a Freight Forwarder
Ygal Bendavid
.
mcetech 2015
:
255-268
[doi]
E-Technologies - 6th International Conference, MCETECH 2015, Montréal, QC, Canada, May 12-15, 2015, Proceedings
Morad Benyoucef
,
Michael Weiss
,
Hafedh Mili
, editors,
Volume 209 of
Lecture Notes in Business Information Processing
, Springer,
2015.
[doi]
Teaching Enterprise Modeling Based on Multi-media Simulation: A Pragmatic Approach
Ilia Bider
,
Martin Henkel
,
Stewart Kowalski
,
Erik Perjons
.
mcetech 2015
:
239-254
[doi]
Recommender Engines Under the Influence of Popularity
Guillaume Blot
,
Pierre Saurel
,
Francis Rousseaux
.
mcetech 2015
:
138-152
[doi]
Towards Automating Business Process Compensation Scoping Logic
Anis Boubaker
,
Hafedh Mili
,
Abderrahmane Leshob
,
Yasmine Charif
.
mcetech 2015
:
20-36
[doi]
Information Flow-Based Security Levels Assessment for Access Control Systems
Sofiene Boulares
,
Kamel Adi
,
Luigi Logrippo
.
mcetech 2015
:
105-121
[doi]
Examining the Effects of Perceived Enjoyment and Habit on Smartphone Addiction: The Role of User Type
Chongyang Chen
,
Kem Z. K. Zhang
,
Sesia J. Zhao
.
mcetech 2015
:
224-235
[doi]
Efficient Privacy-Preserving Identity Scheme for Electronic Validation of Phase 1 Clinical Trials
Hanna Farah
,
Daniel Amyot
,
Khaled El Emam
.
mcetech 2015
:
183-196
[doi]
Halo Effect on the Adoption of Mobile Payment: A Schema Theory Perspective
Xiang Gong
,
Kem Z. K. Zhang
,
Sesia J. Zhao
.
mcetech 2015
:
153-165
[doi]
Ontology-Driven Process Specialization
Abderrahmane Leshob
,
Hafedh Mili
,
Anis Boubaker
.
mcetech 2015
:
3-19
[doi]
PHEN: Parkinson Helper Emergency Notification System Using Bayesian Belief Network
Hamid Mcheick
,
Malak Khreiss
,
Hala Sweidan
,
Iyad Zaarour
.
mcetech 2015
:
212-223
[doi]
Towards Quality-Driven SOA Systems Refactoring Through Planning
Mathieu Nayrolles
,
Eric Beaudry
,
Naouel Moha
,
Petko Valtchev
,
Abdelwahab Hamou-Lhadj
.
mcetech 2015
:
269-284
[doi]
Specification and Detection of Business Process Antipatterns
Francis Palma
,
Naouel Moha
,
Yann-Gaël Guéhéneuc
.
mcetech 2015
:
37-52
[doi]
Geolocation Hazards in Geosocial Networks
Zakaria Sahnoune
,
Cheu Yien Yep
,
Esma Aïmeur
.
mcetech 2015
:
71-88
[doi]
Testing Policy-Based e-Health Monitoring Processes Using TTCN-3
Bernard Stepien
,
Benjamin Eze
,
Liam Peyton
.
mcetech 2015
:
197-211
[doi]
Understanding Consumer Participation on Companies' Brand Microblogs
Kem Z. K. Zhang
,
Morad Benyoucef
,
Sesia J. Zhao
.
mcetech 2015
:
125-137
[doi]
2011
E-Technologies: Transformation in a Connected World - 5th International Conference, MCETECH 2011, Les Diablerets, Switzerland, January 23-26, 2011, Revised Selected Papers
Gilbert Babin
,
Katarina Stanoevska-Slabeva
,
Peter Kropf
, editors,
Volume 78 of
Lecture Notes in Business Information Processing
, Springer,
2011.
[doi]
Towards Model-Based Support for Managing Organizational Transformation
Daniele Barone
,
Liam Peyton
,
Flavio Rizzolo
,
Daniel Amyot
,
John Mylopoulos
.
mcetech 2011
:
17-31
[doi]
Flexible Communication Based on Linguistic and Ontological Cues
Jean-Paul A. Barthès
.
mcetech 2011
:
131-145
[doi]
The Design, Development and Application of a Proxy Credential Auditing Infrastructure for Collaborative Research
Christopher Bayliss
,
Richard O. Sinnott
,
Wei Jie
,
Junaid Arshad
.
mcetech 2011
:
211-226
[doi]
Evolution of Goal-Driven Pattern Families for Business Process Modeling
Saeed Ahmadi Behnam
,
Daniel Amyot
.
mcetech 2011
:
46-61
[doi]
Decentralized Task Allocation Mechanism Applied to QoS Routing in Home Network
Emna Ghedira
,
Lionel Molinier
,
Guy Pujolle
.
mcetech 2011
:
146-157
[doi]
A Study of E-Government Architectures
Rim Helali
,
Ines Achour
,
Lamia Labed Jilani
,
Henda Ben Ghézala
.
mcetech 2011
:
158-172
[doi]
Following the Conversation: A More Meaningful Expression of Engagement
Cate Huston
,
Michael Weiss
,
Morad Benyoucef
.
mcetech 2011
:
199-210
[doi]
Cloud Computing Providers: Characteristics and Recommendations
Maciej Lecznar
,
Susanne Patig
.
mcetech 2011
:
32-45
[doi]
Softw::::I::::re Integration - An Onto-Neural Perspective
Hendrik Ludolph
,
Peter Kropf
,
Gilbert Babin
.
mcetech 2011
:
116-130
[doi]
E-Tourism Portal: A Case Study in Ontology-Driven Development
Hafedh Mili
,
Petko Valtchev
,
Yasmine Charif
,
Laszlo Szathmary
,
Nidhal Daghrir
,
Marjolaine Béland
,
Anis Boubaker
,
Louis Martin
,
François Bédard
,
Sabeh Caid-Essebsi
,
et al.
.
mcetech 2011
:
76-99
[doi]
Toward a Goal-Oriented, Business Intelligence Decision-Making Framework
Alireza Pourshahid
,
Gregory Richards
,
Daniel Amyot
.
mcetech 2011
:
100-115
[doi]
Towards Detecting Influential Users in Social Networks
Amir Afrasiabi Rad
,
Morad Benyoucef
.
mcetech 2011
:
227-240
[doi]
Gossip-Based Networking for Internet-Scale Distributed Systems
Etienne Riviere
,
Spyros Voulgaris
.
mcetech 2011
:
253-284
[doi]
Searching, Translating and Classifying Information in Cyberspace
Jacques Savoy
,
Ljiljana Dolamic
,
Olena Zubaryeva
.
mcetech 2011
:
62-75
[doi]
Harnessing Enterprise 2.0 Technologies: The Midnight Projects
Lee Schlenker
.
mcetech 2011
:
189-198
[doi]
Intelligent Monitoring System for Online Listing and Auctioning
Farid Seifi
,
Mohammad Rastgoo
.
mcetech 2011
:
241-252
[doi]
A Systematic Approach to Web Application Penetration Testing Using TTCN-3
Bernard Stepien
,
Pulei Xiong
,
Liam Peyton
.
mcetech 2011
:
1-16
[doi]
Model-Based Engineering of a Managed Process Application Framework
Abel Tegegne
,
Liam Peyton
.
mcetech 2011
:
173-188
[doi]
2009
Web Search Based on Web Communities Feedback Data
Mehdi Adda
,
Rokia Missaoui
,
Petko Valtchev
.
mcetech 2009
:
169-183
[doi]
Typing for Conflict Detection in Access Control Policies
Kamel Adi
,
Yacine Bouzida
,
Ikhlass Hattak
,
Luigi Logrippo
,
Serge Mankovskii
.
mcetech 2009
:
212-226
[doi]
Toward a Framework for Dynamic Service Binding in E-Procurement
Maryam Ashoori
,
Benjamin Eze
,
Morad Benyoucef
,
Liam Peyton
.
mcetech 2009
:
89-99
[doi]
E-Technologies: Innovation in an Open World, 4th International Conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009. Proceedings
Gilbert Babin
,
Peter G. Kropf
,
Michael Weiss
, editors,
Volume 26 of
Lecture Notes in Business Information Processing
, Springer,
2009.
[doi]
Goal-Driven Development of a Patient Surveillance Application for Improving Patient Safety
Saeed Ahmadi Behnam
,
Daniel Amyot
,
Alan J. Forster
,
Liam Peyton
,
Azalia Shamsaei
.
mcetech 2009
:
65-76
[doi]
Improving Trust and Reputation Modeling in E-Commerce Using Agent Lifetime and Transaction Count
Catherine Cormier
,
Thomas T. Tran
.
mcetech 2009
:
184-195
[doi]
Aligning Goal and Value Models for Information System Design
Ananda Edirisuriya
,
Jelena Zdravkovic
.
mcetech 2009
:
126-140
[doi]
Impact of Diversity on Open Source Software
Hiba Enayat
,
Steven Muegge
,
Stoyan Tanev
.
mcetech 2009
:
155-168
[doi]
A Legal Perspective on Business: Modeling the Impact of Law
Sepideh Ghanavati
,
Alberto Siena
,
Anna Perini
,
Daniel Amyot
,
Liam Peyton
,
Angelo Susi
.
mcetech 2009
:
267-278
[doi]
Dynamic Pricing in Electronic Commerce Using Neural Network
Tapu Kumar Ghose
,
Thomas T. Tran
.
mcetech 2009
:
227-232
[doi]
Integrating Identity Management With Federated Healthcare Data Models
Jun Hu
,
Liam Peyton
.
mcetech 2009
:
100-112
[doi]
A Requirement Engineering Framework for Electronic Data Sharing of Health Care Data Between Organizations
Xia Liu
,
Liam Peyton
,
Craig Kuziemsky
.
mcetech 2009
:
279-289
[doi]
A Reference Model for Semantic Peer-to-Peer Networks
Abdul-Rahman Mawlood-Yunis
,
Michael Weiss
,
Nicola Santoro
.
mcetech 2009
:
319-334
[doi]
An Ontological Approach to Connecting SOA Implementations
Wesley McGregor
.
mcetech 2009
:
40-52
[doi]
Using Instant Messaging Systems as a Platform for Electronic Voting
Anastasia Meletiadou
,
Rüdiger Grimm
.
mcetech 2009
:
12-24
[doi]
Towards a Methodology for Representing and Classifying Business Processes
Hafedh Mili
,
Abderrahmane Leshob
,
Eric Lefebvre
,
Ghislain Lévesque
,
Ghizlane El-Boussaidi
.
mcetech 2009
:
196-211
[doi]
A Multi-criteria Collaborative Filtering Approach for Research Paper Recommendation in Papyres
Amine Naak
,
Hicham Hage
,
Esma Aïmeur
.
mcetech 2009
:
25-39
[doi]
Wrestling With a Paradox: Complexity in Interoperability Standards Making for Healthcare Information Systems
Jeff Pittaway
,
Norm Archer
.
mcetech 2009
:
113-125
[doi]
An Aspect-Oriented Framework for Business Process Improvement
Alireza Pourshahid
,
Gunter Mussbacher
,
Daniel Amyot
,
Michael Weiss
.
mcetech 2009
:
290-305
[doi]
Verification of Information Flow in Agent-Based Systems
Khair Eddin Sabri
,
Ridha Khédri
,
Jason Jaskolka
.
mcetech 2009
:
252-266
[doi]
Design Principles for E-Government Architectures
Alain Sandoz
.
mcetech 2009
:
240-245
[doi]
Global Location-Based Access to Web Applications Using Atom-Based Automatic Update
Kulwinder Singh
,
Dong-Won Park
.
mcetech 2009
:
77-88
[doi]
Integration Testing of Web Applications and Databases Using TTCN-3
Bernard Stepien
,
Liam Peyton
.
mcetech 2009
:
306-318
[doi]
A Non-technical User-Oriented Display Notation for XACML Conditions
Bernard Stepien
,
Amy Felty
,
Stan Matwin
.
mcetech 2009
:
53-64
[doi]
A Proposed Intelligent Policy-Based Interface for a Mobile eHealth Environment
Amir Tavasoli
,
Norm Archer
.
mcetech 2009
:
246-251
[doi]
TwoStep: An Authentication Method Combining Text and Graphical Passwords
Paul C. van Oorschot
,
Tao Wan
.
mcetech 2009
:
233-239
[doi]
Model-Based Penetration Test Framework for Web Applications Using TTCN-3
Pulei Xiong
,
Bernard Stepien
,
Liam Peyton
.
mcetech 2009
:
141-154
[doi]
Helping E-Commerce Consumers Make Good Purchase Decisions: A User Reviews-Based Approach
Richong Zhang
,
Thomas T. Tran
.
mcetech 2009
:
1-11
[doi]
Sign in
or
sign up
to see more results.