Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tmis/tmis5.bht:"
@article{DBLP:journals/tmis/ChakrabortyRD15, author = {Suranjan Chakraborty and Christoph Rosenkranz and Josh Dehlinger}, title = {Getting to the Shalls: Facilitating Sensemaking in Requirements Engineering}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {3}, pages = {14:1--14:30}, year = {2015}, url = {https://doi.org/10.1145/2629351}, doi = {10.1145/2629351}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/ChakrabortyRD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/CiccioM15, author = {Claudio Di Ciccio and Massimo Mecella}, title = {On the Discovery of Declarative Control Flows for Artful Processes}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {4}, pages = {24:1--24:37}, year = {2015}, url = {https://doi.org/10.1145/2629447}, doi = {10.1145/2629447}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/CiccioM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/JainCMR15, author = {Radhika Jain and Lan Cao and Kannan Mohan and Balasubramaniam Ramesh}, title = {Situated Boundary Spanning: An Empirical Investigation of Requirements Engineering Practices in Product Family Development}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {3}, pages = {16:1--16:29}, year = {2015}, url = {https://doi.org/10.1145/2629395}, doi = {10.1145/2629395}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/JainCMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/JarkeL15, author = {Matthias Jarke and Kalle Lyytinen}, title = {Editorial: "Complexity of Systems Evolution: Requirements Engineering Perspective"}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {3}, pages = {11:1--11:7}, year = {2015}, url = {https://doi.org/10.1145/2629597}, doi = {10.1145/2629597}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/JarkeL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/JiangADT15, author = {Jie Jiang and Huib Aldewereld and Virginia Dignum and Yao{-}Hua Tan}, title = {Compliance Checking of Organizational Interactions}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {4}, pages = {23:1--23:24}, year = {2015}, url = {https://doi.org/10.1145/2629630}, doi = {10.1145/2629630}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmis/JiangADT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/KingS15, author = {John Leslie King and Carl P. Simon}, title = {Complications with Complexity in Requirements}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {3}, pages = {13:1--13:12}, year = {2015}, url = {https://doi.org/10.1145/2629375}, doi = {10.1145/2629375}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/KingS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/NekviM15, author = {Md. Rashed Iqbal Nekvi and Nazim H. Madhavji}, title = {Impediments to Regulatory Compliance of Requirements in Contractual Systems Engineering Projects: {A} Case Study}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {3}, pages = {15:1--15:35}, year = {2015}, url = {https://doi.org/10.1145/2629432}, doi = {10.1145/2629432}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/NekviM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/PartingtonWSOK15, author = {Andrew Partington and Moe Thandar Wynn and Suriadi Suriadi and Chun Ouyang and Jonathan Karnon}, title = {Process Mining for Clinical Processes: {A} Comparative Analysis of Four Australian Hospitals}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {4}, pages = {19:1--19:18}, year = {2015}, url = {https://doi.org/10.1145/2629446}, doi = {10.1145/2629446}, timestamp = {Wed, 17 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmis/PartingtonWSOK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/WangWLAF15, author = {G. Alan Wang and Harry Jiannan Wang and Jiexun Li and Alan S. Abrahams and Weiguo Fan}, title = {An Analytical Framework for Understanding Knowledge-Sharing Processes in Online Q{\&}A Communities}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {4}, pages = {18:1--18:31}, year = {2015}, url = {https://doi.org/10.1145/2629445}, doi = {10.1145/2629445}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/WangWLAF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/YanHLW15, author = {Jiaqi Yan and Daning Hu and Stephen S. Y. Liao and Huaiqing Wang}, title = {Mining Agents' Goals in Agent-Oriented Business Processes}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {4}, pages = {20:1--20:22}, year = {2015}, url = {https://doi.org/10.1145/2629448}, doi = {10.1145/2629448}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/YanHLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/BouktifSA14, author = {Salah Bouktif and Houari A. Sahraoui and Faheem Ahmed}, title = {Predicting Stability of Open-Source Software Systems Using Combination of Bayesian Classifiers}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {1}, pages = {3:1--3:26}, year = {2014}, url = {https://doi.org/10.1145/2555596}, doi = {10.1145/2555596}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/BouktifSA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/DeodharBCMM14, author = {Suruchi Deodhar and Keith R. Bisset and Jiangzhuo Chen and Yifei Ma and Madhav V. Marathe}, title = {An Interactive, Web-Based High Performance Modeling Environment for Computational Epidemiology}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {2}, pages = {7:1--7:27}, year = {2014}, url = {https://doi.org/10.1145/2629692}, doi = {10.1145/2629692}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/DeodharBCMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/FridgenKBW14, author = {Gilbert Fridgen and Julia Klier and Martina Beer and Thomas Wolf}, title = {Improving Business Value Assurance in Large-Scale {IT} Projects - {A} Quantitative Method Based on Founded Requirements Assessment}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {3}, pages = {12:1--12:17}, year = {2014}, url = {https://doi.org/10.1145/2638544}, doi = {10.1145/2638544}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmis/FridgenKBW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/Goodman14, author = {Seymour E. Goodman}, title = {Building the Nation's Cyber Security Workforce: Contributions from the {CAE} Colleges and Universities}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {2}, pages = {6:1--6:9}, year = {2014}, url = {https://doi.org/10.1145/2629636}, doi = {10.1145/2629636}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/Goodman14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/GuoSV14, author = {Xitong Guo and Sherry X. Sun and Doug Vogel}, title = {A Dataflow Perspective for Business Process Integration}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {4}, pages = {22:1--22:33}, year = {2014}, url = {https://doi.org/10.1145/2629450}, doi = {10.1145/2629450}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmis/GuoSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/HoLG14, author = {Joyce C. Ho and Cheng H. Lee and Joydeep Ghosh}, title = {Septic Shock Prediction for Patients with Missing Data}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {1}, pages = {1:1--1:15}, year = {2014}, url = {https://doi.org/10.1145/2591676}, doi = {10.1145/2591676}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/HoLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/HuangBL14, author = {Lihua Huang and Sulin Ba and Xianghua Lu}, title = {Building Online Trust in a Culture of Confucianism: The Impact of Process Flexibility and Perceived Control}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {1}, pages = {4:1--4:23}, year = {2014}, url = {https://doi.org/10.1145/2576756}, doi = {10.1145/2576756}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/HuangBL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/JuretaBEM14, author = {Ivan Jureta and Alexander Borgida and Neil A. Ernst and John Mylopoulos}, title = {The Requirements Problem for Adaptive Systems}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {3}, pages = {17:1--17:33}, year = {2014}, url = {https://doi.org/10.1145/2629376}, doi = {10.1145/2629376}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/JuretaBEM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/KellerTF14, author = {Thorben Keller and Fr{\'{e}}d{\'{e}}ric Thiesse and Elgar Fleisch}, title = {Classification Models for RFID-Based Real-Time Detection of Process Events in the Supply Chain: An Empirical Study}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {4}, pages = {25:1--25:30}, year = {2014}, url = {https://doi.org/10.1145/2629449}, doi = {10.1145/2629449}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/KellerTF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/KostkovaSL14, author = {Patty Kostkova and Martin Szomszor and Connie St. Luis}, title = {{\#}swineflu: The Use of Twitter as an Early Warning and Risk Communication Tool in the 2009 Swine Flu Pandemic}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {2}, pages = {8:1--8:25}, year = {2014}, url = {https://doi.org/10.1145/2597892}, doi = {10.1145/2597892}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/KostkovaSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/SilvaJC14, author = {Thushari P. Silva and Jian Ma and Yang Chen}, title = {Process Analytics Approach for R{\&}D Project Selection}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {4}, pages = {21:1--21:34}, year = {2014}, url = {https://doi.org/10.1145/2629436}, doi = {10.1145/2629436}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/SilvaJC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/TsaiQ14, author = {Chih{-}Fong Tsai and Zen{-}Yu Quan}, title = {Stock Prediction by Searching for Similarities in Candlestick Charts}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {2}, pages = {9:1--9:21}, year = {2014}, url = {https://doi.org/10.1145/2591672}, doi = {10.1145/2591672}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/TsaiQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/YangYJ14, author = {Christopher C. Yang and Haodong Yang and Ling Jiang}, title = {Postmarketing Drug Safety Surveillance Using Publicly Available Health-Consumer-Contributed Content in Social Media}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {1}, pages = {2:1--2:21}, year = {2014}, url = {https://doi.org/10.1145/2576233}, doi = {10.1145/2576233}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/YangYJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/YeoRUP14, author = {M. Lisa Yeo and Erik Rolland and Jackie Rees Ulmer and Raymond A. Patterson}, title = {Risk Mitigation Decisions for {IT} Security}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {1}, pages = {5:1--5:21}, year = {2014}, url = {https://doi.org/10.1145/2576757}, doi = {10.1145/2576757}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/YeoRUP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.