


default search action
4th ES 2016: Melbourne, Australia
- Gang Li, Yale Yu:

4th International Conference on Enterprise Systems, ES 2016, Melbourne, Australia, November 2-3, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-3790-2
Enterprise Data Management
- Paula Kotzé, Hanlie Smuts

:
Applying the Foundations of Enterprise Systems Engineering in Complex Real-World Environments: Lessons Learnt from Real-World Project Examples. 1-12 - Ammar Abdallah, James Lapalme, Alain Abran:

Enterprise Architecture Measurement: A Systematic Mapping Study. 13-20 - Haojian Zhong, Lida Xu, Cheng Xie

, Boyi Xu, Fenglin Bu, Hongming Cai:
A Similarity Graph Matching Approach for Instance Disambiguation. 21-28 - Naoum Jamous, Sascha Bosse, Carsten Görling, Johannes Hintsch, Ateeq Khan, Frederik Kramer, Hendrik Müller, Klaus Turowski:

Towards an IT Service Lifecycle Management (ITSLM) Concept. 29-38 - Liuliu Fu, Ling Li:

A Smart Decision Making System for Managing Patient Database. 46-50 - Polly P. L. Leung, Chun-Ho Wu

, W. H. Ip
, George T. S. Ho, V. W. S. Cho, K. K. Y. Kwong:
Customer Loyalty Enhancement of Online-to-Offline Marketing in Beauty Industry. 51-59 - Zhongxiang Xiao, Inji Wijegunaratne, Xinjian Qiang:

Reflections on SOA and Microservices. 60-67 - Naoum Jamous, Stefan Willi Hart, Matthias Volk

, Klaus Turowski:
The I-ID - An IT Solution to Supplement Conventional Identification Cards: The Air Transportation Systems Use Case. 68-75 - Xianghong Tian, Lei Zhang, Wenjuan Wei:

The Design and Implementation of Automatic Grabbing Tool in Tripadvisor. 76-80 - Halima E. Samra

, Ben Soh, Mohammed A. Alzain
:
A Conceptual Model for an Intelligent Simulation-Based Learning Management System Using a Data Mining Agent in Clinical Skills Education. 81-88
Security and Privacy in Enterprise Systems
- Dali Zhu, Ying Li, Na Pang, Weimiao Feng:

An Android System Vulnerability Risk Evaluation Method for Heap Overflow. 89-96 - Danillo Sprovieri, Nikolaos Argyropoulos, Carine Souveyet, Raúl Mazo, Haralambos Mouratidis, Andrew Fish

:
Security Alignment Analysis of Software Product Lines. 97-103 - Lun Li, Meihong Li, Jiqiang Liu, Jia Zhao:

An SDKEY Data Protection and Sharing Scheme with Attribute-Based Encryption for Smartphone. 104-109 - Udsanee Pakdeetrakulwong

, Pornpit Wongthongtham, Suksawat Sae-Lim, Hassan Marzooq Naqvi:
SEOMAS: An Ontology-Based Multi-Agent System for Capturing Semantics of Software Project Information. 110-121 - Johannes Hintsch, Frederik Kramer, Naoum Jamous, Klaus Turowski:

The Application System Landscapes of IT Service Providers: A Multi Case Study. 122-131
Decision Support Systems
- Junjie Song, Naoum Jamous, Klaus Turowski:

Influence in Social Media Marketing: A Quantitative Evaluation Framework from a Large Scale of Empirical Evidence. 136-142 - Knut Hinkelmann

, Emanuele Laurenzi
, Benjamin Lammel, Sabrina Kurjakovic, Robert Woitsch
:
A Semantically-Enhanced Modelling Environment for Business Process as a Service. 143-152 - JiaQi Wu, Huahu Xu, Tzvetomir Vassilev

:
Design of 3D Rendering Platform Based on Cloud Computing. 153-159 - Kuo-Kun Tseng, Dachao Lee, William Hurst

, Fang-Yin Lin, W. H. Ip
:
Frequency Rank Order Statistic with Unknown Neural Network for ECG Identification System. 160-167 - Jens Gulden:

Recommendations for Data Visualizations Based on Gestalt Patterns. 168-177 - Weng Wen, Huaikou Miao:

Context-Based Service Recommendation System Using Probability Model in Mobile Devices. 178-182
Big Data
- Wenjuan Wei, Jiaxin Han, Jie Kong, Haiyang Xia:

Prediction of the Scholarship Using Comprehensive Development. 183-188 - Haiyang Xia, Jiaxin Han, Jie Kong, Wenjuan Wei, Lei Zhang:

Discovering the Academic Situation of Students by Relationship Mining. 189-195 - Xianghong Tian, Jie Kong, Tianqing Zhu, Haiyang Xia:

Discovering Learning Patterns of Male and Female Students by Contrast Targeted Rule Mining. 196-202 - Minghua Zhao, Rui-yang Mo, Yonggang Zhao, Zhenghao Shi:

A Novel and Complete Framework for Face Recognition with Pose Variations Using a Single Image. 203-207 - Xiao Zhu, Guandong Xu:

Applying Visual Analytics on Traditional Data Mining Process: Quick Prototype, Simple Expertise Transformation, and Better Interpretation. 208-213

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














