Search dblp for Publications

export results for "toc:db/journals/tmis/tmis5.bht:"

 download as .bib file

@article{DBLP:journals/tmis/ChakrabortyRD15,
  author       = {Suranjan Chakraborty and
                  Christoph Rosenkranz and
                  Josh Dehlinger},
  title        = {Getting to the Shalls: Facilitating Sensemaking in Requirements Engineering},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {3},
  pages        = {14:1--14:30},
  year         = {2015},
  url          = {https://doi.org/10.1145/2629351},
  doi          = {10.1145/2629351},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/ChakrabortyRD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/CiccioM15,
  author       = {Claudio Di Ciccio and
                  Massimo Mecella},
  title        = {On the Discovery of Declarative Control Flows for Artful Processes},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {4},
  pages        = {24:1--24:37},
  year         = {2015},
  url          = {https://doi.org/10.1145/2629447},
  doi          = {10.1145/2629447},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/CiccioM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/JainCMR15,
  author       = {Radhika Jain and
                  Lan Cao and
                  Kannan Mohan and
                  Balasubramaniam Ramesh},
  title        = {Situated Boundary Spanning: An Empirical Investigation of Requirements
                  Engineering Practices in Product Family Development},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {3},
  pages        = {16:1--16:29},
  year         = {2015},
  url          = {https://doi.org/10.1145/2629395},
  doi          = {10.1145/2629395},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/JainCMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/JarkeL15,
  author       = {Matthias Jarke and
                  Kalle Lyytinen},
  title        = {Editorial: "Complexity of Systems Evolution: Requirements Engineering
                  Perspective"},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {3},
  pages        = {11:1--11:7},
  year         = {2015},
  url          = {https://doi.org/10.1145/2629597},
  doi          = {10.1145/2629597},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/JarkeL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/JiangADT15,
  author       = {Jie Jiang and
                  Huib Aldewereld and
                  Virginia Dignum and
                  Yao{-}Hua Tan},
  title        = {Compliance Checking of Organizational Interactions},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {4},
  pages        = {23:1--23:24},
  year         = {2015},
  url          = {https://doi.org/10.1145/2629630},
  doi          = {10.1145/2629630},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmis/JiangADT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/KingS15,
  author       = {John Leslie King and
                  Carl P. Simon},
  title        = {Complications with Complexity in Requirements},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {3},
  pages        = {13:1--13:12},
  year         = {2015},
  url          = {https://doi.org/10.1145/2629375},
  doi          = {10.1145/2629375},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/KingS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/NekviM15,
  author       = {Md. Rashed Iqbal Nekvi and
                  Nazim H. Madhavji},
  title        = {Impediments to Regulatory Compliance of Requirements in Contractual
                  Systems Engineering Projects: {A} Case Study},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {3},
  pages        = {15:1--15:35},
  year         = {2015},
  url          = {https://doi.org/10.1145/2629432},
  doi          = {10.1145/2629432},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/NekviM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/PartingtonWSOK15,
  author       = {Andrew Partington and
                  Moe Thandar Wynn and
                  Suriadi Suriadi and
                  Chun Ouyang and
                  Jonathan Karnon},
  title        = {Process Mining for Clinical Processes: {A} Comparative Analysis of
                  Four Australian Hospitals},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {4},
  pages        = {19:1--19:18},
  year         = {2015},
  url          = {https://doi.org/10.1145/2629446},
  doi          = {10.1145/2629446},
  timestamp    = {Wed, 17 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmis/PartingtonWSOK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/WangWLAF15,
  author       = {G. Alan Wang and
                  Harry Jiannan Wang and
                  Jiexun Li and
                  Alan S. Abrahams and
                  Weiguo Fan},
  title        = {An Analytical Framework for Understanding Knowledge-Sharing Processes
                  in Online Q{\&}A Communities},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {4},
  pages        = {18:1--18:31},
  year         = {2015},
  url          = {https://doi.org/10.1145/2629445},
  doi          = {10.1145/2629445},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/WangWLAF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/YanHLW15,
  author       = {Jiaqi Yan and
                  Daning Hu and
                  Stephen S. Y. Liao and
                  Huaiqing Wang},
  title        = {Mining Agents' Goals in Agent-Oriented Business Processes},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {4},
  pages        = {20:1--20:22},
  year         = {2015},
  url          = {https://doi.org/10.1145/2629448},
  doi          = {10.1145/2629448},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/YanHLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/BouktifSA14,
  author       = {Salah Bouktif and
                  Houari A. Sahraoui and
                  Faheem Ahmed},
  title        = {Predicting Stability of Open-Source Software Systems Using Combination
                  of Bayesian Classifiers},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {1},
  pages        = {3:1--3:26},
  year         = {2014},
  url          = {https://doi.org/10.1145/2555596},
  doi          = {10.1145/2555596},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/BouktifSA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/DeodharBCMM14,
  author       = {Suruchi Deodhar and
                  Keith R. Bisset and
                  Jiangzhuo Chen and
                  Yifei Ma and
                  Madhav V. Marathe},
  title        = {An Interactive, Web-Based High Performance Modeling Environment for
                  Computational Epidemiology},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {2},
  pages        = {7:1--7:27},
  year         = {2014},
  url          = {https://doi.org/10.1145/2629692},
  doi          = {10.1145/2629692},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/DeodharBCMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/FridgenKBW14,
  author       = {Gilbert Fridgen and
                  Julia Klier and
                  Martina Beer and
                  Thomas Wolf},
  title        = {Improving Business Value Assurance in Large-Scale {IT} Projects -
                  {A} Quantitative Method Based on Founded Requirements Assessment},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {3},
  pages        = {12:1--12:17},
  year         = {2014},
  url          = {https://doi.org/10.1145/2638544},
  doi          = {10.1145/2638544},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmis/FridgenKBW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/Goodman14,
  author       = {Seymour E. Goodman},
  title        = {Building the Nation's Cyber Security Workforce: Contributions from
                  the {CAE} Colleges and Universities},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {2},
  pages        = {6:1--6:9},
  year         = {2014},
  url          = {https://doi.org/10.1145/2629636},
  doi          = {10.1145/2629636},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/Goodman14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/GuoSV14,
  author       = {Xitong Guo and
                  Sherry X. Sun and
                  Doug Vogel},
  title        = {A Dataflow Perspective for Business Process Integration},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {4},
  pages        = {22:1--22:33},
  year         = {2014},
  url          = {https://doi.org/10.1145/2629450},
  doi          = {10.1145/2629450},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmis/GuoSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/HoLG14,
  author       = {Joyce C. Ho and
                  Cheng H. Lee and
                  Joydeep Ghosh},
  title        = {Septic Shock Prediction for Patients with Missing Data},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {1},
  pages        = {1:1--1:15},
  year         = {2014},
  url          = {https://doi.org/10.1145/2591676},
  doi          = {10.1145/2591676},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/HoLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/HuangBL14,
  author       = {Lihua Huang and
                  Sulin Ba and
                  Xianghua Lu},
  title        = {Building Online Trust in a Culture of Confucianism: The Impact of
                  Process Flexibility and Perceived Control},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {1},
  pages        = {4:1--4:23},
  year         = {2014},
  url          = {https://doi.org/10.1145/2576756},
  doi          = {10.1145/2576756},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/HuangBL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/JuretaBEM14,
  author       = {Ivan Jureta and
                  Alexander Borgida and
                  Neil A. Ernst and
                  John Mylopoulos},
  title        = {The Requirements Problem for Adaptive Systems},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {3},
  pages        = {17:1--17:33},
  year         = {2014},
  url          = {https://doi.org/10.1145/2629376},
  doi          = {10.1145/2629376},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/JuretaBEM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/KellerTF14,
  author       = {Thorben Keller and
                  Fr{\'{e}}d{\'{e}}ric Thiesse and
                  Elgar Fleisch},
  title        = {Classification Models for RFID-Based Real-Time Detection of Process
                  Events in the Supply Chain: An Empirical Study},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {4},
  pages        = {25:1--25:30},
  year         = {2014},
  url          = {https://doi.org/10.1145/2629449},
  doi          = {10.1145/2629449},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/KellerTF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/KostkovaSL14,
  author       = {Patty Kostkova and
                  Martin Szomszor and
                  Connie St. Luis},
  title        = {{\#}swineflu: The Use of Twitter as an Early Warning and Risk Communication
                  Tool in the 2009 Swine Flu Pandemic},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {2},
  pages        = {8:1--8:25},
  year         = {2014},
  url          = {https://doi.org/10.1145/2597892},
  doi          = {10.1145/2597892},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/KostkovaSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/SilvaJC14,
  author       = {Thushari P. Silva and
                  Jian Ma and
                  Yang Chen},
  title        = {Process Analytics Approach for R{\&}D Project Selection},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {4},
  pages        = {21:1--21:34},
  year         = {2014},
  url          = {https://doi.org/10.1145/2629436},
  doi          = {10.1145/2629436},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/SilvaJC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/TsaiQ14,
  author       = {Chih{-}Fong Tsai and
                  Zen{-}Yu Quan},
  title        = {Stock Prediction by Searching for Similarities in Candlestick Charts},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {2},
  pages        = {9:1--9:21},
  year         = {2014},
  url          = {https://doi.org/10.1145/2591672},
  doi          = {10.1145/2591672},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/TsaiQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/YangYJ14,
  author       = {Christopher C. Yang and
                  Haodong Yang and
                  Ling Jiang},
  title        = {Postmarketing Drug Safety Surveillance Using Publicly Available Health-Consumer-Contributed
                  Content in Social Media},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {1},
  pages        = {2:1--2:21},
  year         = {2014},
  url          = {https://doi.org/10.1145/2576233},
  doi          = {10.1145/2576233},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/YangYJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/YeoRUP14,
  author       = {M. Lisa Yeo and
                  Erik Rolland and
                  Jackie Rees Ulmer and
                  Raymond A. Patterson},
  title        = {Risk Mitigation Decisions for {IT} Security},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {1},
  pages        = {5:1--5:21},
  year         = {2014},
  url          = {https://doi.org/10.1145/2576757},
  doi          = {10.1145/2576757},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/YeoRUP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics