Abstract is missing.
- Towards Self-development of Evolutionary Information Systems: An Action Research of Business Architecture Development by Students in Socially Networked GroupsMart Roost, Kuldar Taveter, Karin Rava, Jaak Tepandi, Gunnar Piho, Rein Kuusik, Enn Ounapuu. 1-15 [doi]
- Research Methodology for Enterprise Interoperability Architecture ApproachWided Guédria, Khaled Gaaloul, Henderik Alex Proper, Yannick Naudet. 16-29 [doi]
- Pattern-based Design Research in Enterprise Architecture ManagementSabine Buckl, Florian Matthes, Alexander W. Schneider, Christian M. Schweda. 30-42 [doi]
- Developing the GEA Method - Design Science and Case-Study Research in ActionRoel Wagter, Henderik Alex Proper, Dirk Witte. 43-57 [doi]
- Towards an Engineering-Based Research Approach for Enterprise Architecture: Lessons Learned from Normalized Systems TheoryPhilip Huysmans, Jan Verelst. 58-72 [doi]
- Research Approach in Enterprise Engineering: A Matter of EngineeringNiek J. Pluijmert, Wolfgang Alfred Molnar, Henderik Alex Proper. 73-86 [doi]
- Development of Software Tool Support for Enterprise Architecture in Small and Medium-Sized EnterprisesJoost Dumeez, Maxime Bernaert, Geert Poels. 87-98 [doi]
- Towards the Definition, Implementation and Communication of an IT Strategy: The Case of IT Strategy at EPFLGorica Tapandjieva, Didier Rey Marchetti, Irina Rychkova, Alain Wegmann. 99-110 [doi]
- Simulation-Driven Approach for Business Rules DiscoveryBiljana Bajic-Bizumic, Irina Rychkova, Alain Wegmann. 111-123 [doi]
- Application of IT Management Frameworks in Higher Education InstitutionsMartin Hans Knahl. 124-133 [doi]
- Using ArchiMate and TOGAF to Understand the Enterprise Architecture and ITIL RelationshipMarco Vicente, Nelson Gama, Miguel Mira da Silva. 134-145 [doi]
- Model-Centric Strategy-IT Alignment: An Empirical Study in ProgressConstantinos Giannoulis, Jelena Zdravkovic, Michaël Petit. 146-155 [doi]
- IT Governance Mechanisms PatternsRafael Almeida, Ruben Filipe de Sousa Pereira, Miguel Mira da Silva. 156-161 [doi]
- Correlating Services with Business Objectives in the ServAlign FrameworkAditya Ghose, Lam-Son Lê, Evan D. Morrison. 162-167 [doi]
- Cognitive Aspects of Structured Process Modeling - (Position Paper)Jan Claes, Frederik Gailly, Geert Poels. 168-173 [doi]
- Zooming In and Out in Requirements EngineeringManuel Imaz. 174-185 [doi]
- Using Distributed Cognition Theory for Analyzing the Deployment Architecture ProcessNaomi Unkelos-Shpigel, Irit Hadar. 186-191 [doi]
- Cognitive Principles to Support Information Requirements AgilityJeffrey Parsons, Yair Wand. 192-197 [doi]
- Change Patterns for Model Creation: Investigating the Role of Nesting Depth - (Position Paper)Barbara Weber, Jakob Pinggera, Victoria Torres, Manfred Reichert. 198-204 [doi]
- Enabling Personalized Process Schedules with Time-Aware Process ViewsAndreas Lanz, Jens Kolb, Manfred Reichert. 205-216 [doi]
- Automatic Business Process Model Translation with BPMTKimon Batoulis, Rami-Habib Eid-Sabbagh, Henrik Leopold, Mathias Weske, Jan Mendling. 217-228 [doi]
- A Theoretical Basis for Using Virtual Worlds as a Personalised Process Visualisation ApproachHanwen Guo, Ross Brown, Rune Rasmussen. 229-240 [doi]
- A Research Program for Studying the Impact of Process Representation on Risk AnalysisHamzah Ritchi, Jan Mendling. 241-252 [doi]
- Toward Innovative Model Based Enterprise IT OutsourcingVinay Kulkarni, Sagar Sunkle. 253-263 [doi]
- Characteristics of Knowledge and Barriers towards Innovation and Improvement in Collaborative Manufacturing Process ChainsBenjamin Knoke, Thorsten Wuest, Klaus-Dieter Thoben. 264-273 [doi]
- A Logic-Based Formalization of KPIs for Virtual EnterprisesClaudia Diamantini, Domenico Potena, Emanuele Storti. 274-285 [doi]
- Cross-Domain Crawling for InnovationPierluigi Assogna, Francesco Taglino. 286-297 [doi]
- Hybrid Modelling with ADOxx: Virtual Enterprise Interoperability Using Meta ModelsRobert Woitsch. 298-303 [doi]
- Re-engineering Data with 4D Ontologies and Graph DatabasesSergio de Cesare, George Foy, Christopher Partridge. 304-316 [doi]
- Supporting Customer Choice with Semantic Similarity Search and ExplanationAnna Formica, Michele Missikoff, Elaheh Pourabbas, Francesco Taglino. 317-328 [doi]
- An Application of Philosophy in Software Modelling and Future Information Systems DevelopmentBrian Henderson-Sellers, Cesar Gonzalez-Perez, Greg Walkerden. 329-340 [doi]
- Towards a Sociomaterial OntologyMaria Bergholtz, Owen Eriksson, Paul Johannesson. 341-348 [doi]
- Knowledge Organization and the Conceptual Basis for Building Classification Systems for Complex Documents: An Application on the Brazilian Popular Song DomainRodrigo De Santis. 349-360 [doi]
- Non-monotonic Reasoning in Conceptual Modeling and Ontology Design: A ProposalGiovanni Casini, Alessandro Mosca. 361-370 [doi]
- Process Variability through Automated Late Selection of FragmentsAitor Murguzur, Goiuria Sagardui, Karmele Intxausti, Salvador Trujillo. 371-385 [doi]
- Towards Highly Adaptive Data-Intensive Systems: A Research AgendaMarco Mori, Anthony Cleve. 386-401 [doi]
- Formalizing Service Variability Modeling in SOA-Based SolutionsKarthikeyan Ponnalagu, Nanjangud C. Narendra, Aditya Ghose. 402-416 [doi]
- Towards Understanding Software Process Variability from Contextual Evidence of ChangeTomás Martínez-Ruiz, Francisco Ruiz, Mario Piattini. 417-431 [doi]
- Towards a Formal Approach for Prototyping and Verifying Self-Adaptive SystemsJuan F. Inglés-Romero, Cristina Vicente-Chicote. 432-446 [doi]
- A Model Driven Software Product Line Process for Developing ApplicationsSami Ouali, Naoufel Kraïem, Zuhoor Al-Khanjari, Youcef Baghdadi. 447-454 [doi]
- Privacy in the Cloud: Bridging the Gap between Design and ImplementationVassilis Manousakis, Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis. 455-465 [doi]
- A Scalable Multi-Party Protocol for Privacy-Preserving Equality TestMaryam Sepehri, Stelvio Cimato, Ernesto Damiani. 466-477 [doi]
- Goal-Oriented Security Requirements Analysis for a System Used in Several Different ActivitiesHaruhiko Kaiya, Takao Okubo, Nobuyuki Kanaya, Yuji Suzuki, Shinpei Ogata, Kenji Kaijiri, Nobukazu Yoshioka. 478-489 [doi]
- Towards Engineering Trust-Aware Future Internet SystemsFrancisco Moyano, M. Carmen Fernández Gago, Javier Lopez. 490-501 [doi]
- Security Model for Large Scale Content Distribution Applied to Federated Virtual EnvironmentsAdam Wójtowicz. 502-511 [doi]
- Client-Side Detection of SQL Injection AttackHossain Shahriar, Sarah North, Wei-Chuen Chen. 512-517 [doi]
- Early Dealing with Evolving Risks in Long-Life Evolving Software SystemsLe Minh Sang Tran. 518-523 [doi]
- Modeling and Analyzing Information Integrity in Safety Critical SystemsMohamad Gharib, Paolo Giorgini. 524-529 [doi]