Abstract is missing.
- Comparing User Perspectives in a Virtual Reality Cultural Heritage EnvironmentLuana Bulla, Stefano De Giorgis, Aldo Gangemi, Chiara Lucifora, Misael Mongiovì. 3-15 [doi]
- Can Information System Engineering Make Cyber-Human Systems Smarter?Steven Alter. 16-32 [doi]
- Perceptual Risk-Aware Adaptive Responsibility Sensitive Safety for Autonomous DrivingXiwei Li, Xi Wu, Yongxin Zhao, Yongjian Li. 33-49 [doi]
- Configuration Optimization with Limited Functional ImpactÉdouard Guégain, Amir Taherkordi, Clément Quinton. 53-68 [doi]
- Modeling Context-Aware Events and Responses in an IoT EnvironmentMarc Vila 0001, Maria-Ribera Sancho, Ernest Teniente. 71-87 [doi]
- Modular Quality-of-Service Analysis of Software Design Models for Cyber-Physical SystemsRiccardo Pinciroli, Raffaela Mirandola, Catia Trubiani. 88-104 [doi]
- Simulating and Analyzing Crowdsourcing Impacts in Flood Management: A Geo-spatial Agent-Based ApproachAurélien Richa, Chihab Hanachi, Patricia Stolf. 107-122 [doi]
- A Data-Centric Approach for Reducing Carbon Emissions in Deep LearningMartín Anselmo, Monica Vitali. 123-138 [doi]
- Unsupervised Task Recognition from User Interaction StreamsAdrian Rebmann, Han van der Aa. 141-157 [doi]
- Revealing the Importance of Setting Parameters in Declarative Discovery Algorithms: An Evolutionary-Based MethodologyVanessa Pradas Fernández, Ángel Jesús Varela-Vaca, María Teresa Gómez López. 158-173 [doi]
- Why Am I Waiting? Data-Driven Analysis of Waiting Times in Business ProcessesKatsiaryna Lashkevich, Fredrik Milani, David Chapela-Campa, Ihar Suvorau, Marlon Dumas. 174-190 [doi]
- Extracting Event Data from Document-Driven Enterprise SystemsDiego Calvanese, Mieke Jans, Tahir Emre Kalayci, Marco Montali. 193-209 [doi]
- Event Data-Driven Feasibility Checking of Process SchedulesHannes Häfke, Sebastiaan J. van Zelst. 210-225 [doi]
- Comparing Trace Similarity Metrics Across Logs and Evaluation MeasuresChristoffer Olling Back, Jakob Grue Simonsen. 226-242 [doi]
- Where Are the Readings Behind Your Concept Maps? Annotation-driven Concept MappingOscar Díaz, Xabier Garmendia. 245-260 [doi]
- Ontological Representation of FAIR Principles: A Blueprint for FAIRer Data SourcesAnna Bernasconi 0002, Alberto García Simón, Giancarlo Guizzardi, Luiz Olavo Bonino da Silva Santos, Veda C. Storey. 261-277 [doi]
- Enabling Representation Learning in Ontology-Driven Conceptual Modeling Using Graph Neural NetworksSyed Juned Ali, Giancarlo Guizzardi, Dominik Bork. 278-294 [doi]
- DOML: A New Modelling Approach to Infrastructure-as-CodeMichele Chiari, Bin Xiang, Galia Novakova Nedeltcheva, Elisabetta Di Nitto, Lorenzo Blasi, Debora Benedetto, Laurentiu Niculut. 297-313 [doi]
- Task Completeness Assessments in the Evolution of Domain-Specific Modelling LanguagesVijanti Ramautar, Sergio España, Sjaak Brinkkemper. 314-329 [doi]
- Lessons Learned in Model-Based Reverse Engineering of Large Legacy SystemsLaura García-Borgoñón, Miguel A. Barcelona, Armando J. Egea, German Reyes, Alejandro Sainz-de-la-maza, Adolfo González-Uzabal. 330-344 [doi]
- Design and Evaluation of a User Interface Concept for Prescriptive Process MonitoringKateryna Kubrak, Fredrik Milani, Alexander Nolte, Marlon Dumas. 347-363 [doi]
- Learning When to Treat Business Processes: Prescriptive Process Monitoring with Causal Inference and Reinforcement LearningZahra Dasht Bozorgi, Marlon Dumas, Marcello La Rosa, Artem Polyvyanyy, Mahmoud Shoush, Irene Teinemaa. 364-380 [doi]
- Model-Agnostic Event Log Augmentation for Predictive Process MonitoringMartin Käppel, Stefan Jablonski. 381-397 [doi]
- Detecting Deviations Between External and Internal Regulatory Requirements for Improved Process Compliance AssessmentCatherine Sai, Karolin Winter, Elsa Fernanda, Stefanie Rinderle-Ma. 401-416 [doi]
- Verification of Quantitative Temporal Compliance Requirements in Process Descriptions Over Event LogsMarisol Barrientos, Karolin Winter, Juergen Mangler, Stefanie Rinderle-Ma. 417-433 [doi]
- C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-AlignmentsKristo Raun, Max Nielsen, Andrea Burattin, Ahmed Awad 0001. 437-453 [doi]
- Supporting Provenance and Data Awareness in Exploratory Process MiningFrancesca Zerbato, Andrea Burattin, Hagen Völzer, Paul Nelson Becker, Elia Boscaini, Barbara Weber. 454-470 [doi]
- Bridging Research Fields: An Empirical Study on Joint, Neural Relation Extraction TechniquesLars Ackermann, Julian Neuberger, Martin Käppel, Stefan Jablonski. 471-486 [doi]
- Designing Secure and Privacy-Preserving Information Systems for Industry BenchmarkingJan Pennekamp, Johannes Lohmöller, Eduard Vlad, Joscha Loos, Niklas Rodemann, Patrick Sapel, Ina Berenice Fink, Seth Schmitz, Christian Hopmann, Matthias Jarke, Günther Schuh, Klaus Wehrle, Martin Henze. 489-505 [doi]
- PMDG: Privacy for Multi-perspective Process Mining Through Data GeneralizationRyan Hildebrant, Stephan A. Fahrenkrog-Petersen, Matthias Weidlich 0001, Shangping Ren. 506-521 [doi]
- A Case Study on the Impact of Forensic-Ready Information Systems on the Security PostureLukas Daubner, Raimundas Matulevicius, Barbora Buhnova, Matej Antol, Michal Ruzicka, Tomás Pitner. 522-538 [doi]
- CREATED: Generating Viable Counterfactual Sequences for Predictive Process AnalyticsOlusanmi Hundogan, Xixi Lu 0001, Yupei Du, Hajo A. Reijers. 541-557 [doi]
- Counterfactuals and Ways to Build Them: Evaluating Approaches in Predictive Process MonitoringAndrei Buliga, Chiara Di Francescomarino, Chiara Ghidini, Fabrizio Maria Maggi. 558-574 [doi]
- Identifying and Removing the Ghosts of Reproducibility in Service Recommendation ResearchTianyu Jiang, Mingyi Liu, Zhiying Tu, Zhongjie Wang. 577-593 [doi]
- A Resource-Constrained Multi-level SLA Customization Approach Based on QoE Analysis of Large-Scale CustomersMin Li, Hanchuan Xu, Xiaofei Xu, Zhongjie Wang. 594-610 [doi]
- Request Relaxation Based-on Provider Constraints for a Capability-Based NaaS Services DiscoveryImen Jerbi, Hayet Brabra, Mohamed Sellami, Walid Gaaloul, Sami Bhiri, Boualem Benatallah, Djamal Zeghlache, Olivier Tirat. 611-627 [doi]