default search action
4th ES 2016: Melbourne, Australia
- Gang Li, Yale Yu:
4th International Conference on Enterprise Systems, ES 2016, Melbourne, Australia, November 2-3, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-3790-2
Enterprise Data Management
- Paula Kotzé, Hanlie Smuts:
Applying the Foundations of Enterprise Systems Engineering in Complex Real-World Environments: Lessons Learnt from Real-World Project Examples. 1-12 - Ammar Abdallah, James Lapalme, Alain Abran:
Enterprise Architecture Measurement: A Systematic Mapping Study. 13-20 - Haojian Zhong, Lida Xu, Cheng Xie, Boyi Xu, Fenglin Bu, Hongming Cai:
A Similarity Graph Matching Approach for Instance Disambiguation. 21-28 - Naoum Jamous, Sascha Bosse, Carsten Görling, Johannes Hintsch, Ateeq Khan, Frederik Kramer, Hendrik Müller, Klaus Turowski:
Towards an IT Service Lifecycle Management (ITSLM) Concept. 29-38 - Liuliu Fu, Ling Li:
A Smart Decision Making System for Managing Patient Database. 46-50 - Polly P. L. Leung, Chun-Ho Wu, W. H. Ip, George T. S. Ho, V. W. S. Cho, K. K. Y. Kwong:
Customer Loyalty Enhancement of Online-to-Offline Marketing in Beauty Industry. 51-59 - Zhongxiang Xiao, Inji Wijegunaratne, Xinjian Qiang:
Reflections on SOA and Microservices. 60-67 - Naoum Jamous, Stefan Willi Hart, Matthias Volk, Klaus Turowski:
The I-ID - An IT Solution to Supplement Conventional Identification Cards: The Air Transportation Systems Use Case. 68-75 - Xianghong Tian, Lei Zhang, Wenjuan Wei:
The Design and Implementation of Automatic Grabbing Tool in Tripadvisor. 76-80 - Halima E. Samra, Ben Soh, Mohammed A. Alzain:
A Conceptual Model for an Intelligent Simulation-Based Learning Management System Using a Data Mining Agent in Clinical Skills Education. 81-88
Security and Privacy in Enterprise Systems
- Dali Zhu, Ying Li, Na Pang, Weimiao Feng:
An Android System Vulnerability Risk Evaluation Method for Heap Overflow. 89-96 - Danillo Sprovieri, Nikolaos Argyropoulos, Carine Souveyet, Raúl Mazo, Haralambos Mouratidis, Andrew Fish:
Security Alignment Analysis of Software Product Lines. 97-103 - Lun Li, Meihong Li, Jiqiang Liu, Jia Zhao:
An SDKEY Data Protection and Sharing Scheme with Attribute-Based Encryption for Smartphone. 104-109 - Udsanee Pakdeetrakulwong, Pornpit Wongthongtham, Suksawat Sae-Lim, Hassan Marzooq Naqvi:
SEOMAS: An Ontology-Based Multi-Agent System for Capturing Semantics of Software Project Information. 110-121 - Johannes Hintsch, Frederik Kramer, Naoum Jamous, Klaus Turowski:
The Application System Landscapes of IT Service Providers: A Multi Case Study. 122-131
Decision Support Systems
- Junjie Song, Naoum Jamous, Klaus Turowski:
Influence in Social Media Marketing: A Quantitative Evaluation Framework from a Large Scale of Empirical Evidence. 136-142 - Knut Hinkelmann, Emanuele Laurenzi, Benjamin Lammel, Sabrina Kurjakovic, Robert Woitsch:
A Semantically-Enhanced Modelling Environment for Business Process as a Service. 143-152 - JiaQi Wu, Huahu Xu, Tzvetomir Vassilev:
Design of 3D Rendering Platform Based on Cloud Computing. 153-159 - Kuo-Kun Tseng, Dachao Lee, William Hurst, Fang-Yin Lin, W. H. Ip:
Frequency Rank Order Statistic with Unknown Neural Network for ECG Identification System. 160-167 - Jens Gulden:
Recommendations for Data Visualizations Based on Gestalt Patterns. 168-177 - Weng Wen, Huaikou Miao:
Context-Based Service Recommendation System Using Probability Model in Mobile Devices. 178-182
Big Data
- Wenjuan Wei, Jiaxin Han, Jie Kong, Haiyang Xia:
Prediction of the Scholarship Using Comprehensive Development. 183-188 - Haiyang Xia, Jiaxin Han, Jie Kong, Wenjuan Wei, Lei Zhang:
Discovering the Academic Situation of Students by Relationship Mining. 189-195 - Xianghong Tian, Jie Kong, Tianqing Zhu, Haiyang Xia:
Discovering Learning Patterns of Male and Female Students by Contrast Targeted Rule Mining. 196-202 - Minghua Zhao, Rui-yang Mo, Yonggang Zhao, Zhenghao Shi:
A Novel and Complete Framework for Face Recognition with Pose Variations Using a Single Image. 203-207 - Xiao Zhu, Guandong Xu:
Applying Visual Analytics on Traditional Data Mining Process: Quick Prototype, Simple Expertise Transformation, and Better Interpretation. 208-213
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.