Enterprise Information Systems: 21st International Conference, ICEIS 2019, Heraklion, Crete, Greece, May 3–5, 2019, Revised Selected Papers

Enterprise security is complicated by the use of mobile devices. These devices roam outside the protections of the enterprise core network. They operate closer to threats while simultaneously being farther from the enterprise, which makes compromise more likely and response more difficult. This paper describes an approach using software agents installed on endpoint devices to maintain security of these devices and their associated enterprise. These agents monitor local activity, prevent harmful behavior, allow remote management, and report back to the enterprise. The challenge in this environment is the security of the agents and their communication with the enterprise. This work presents an agent architecture that operates within a high-security Enterprise Level Security (ELS) architecture that preserves end-to-end integrity, encryption, and accountability. This architecture uses secure hardware for sensitive key operations and device attestation. Software agents leverage this hardware security to provide services consistent with the ELS framework. Additional agents leverage this baseline security to provide additional features and functions. This enables an enterprise to manage and secure all endpoint device agents and their communications with other enterprise services.

[1]  Victoria J. Hodge,et al.  A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.

[2]  Andreas Kerren,et al.  Toward the role of interaction in Visual Analytics , 2012, Proceedings Title: Proceedings of the 2012 Winter Simulation Conference (WSC).

[3]  Fabio Polticelli,et al.  An Automatic Identification and Resolution System for Protein-Related Abbreviations in Scientific Papers , 2011, EvoBio.

[4]  Charles R. Severance Massimo Banzi: Building Arduino , 2014, Computer.

[5]  Niklas Elmqvist,et al.  Embodied Human-Data Interaction , 2011 .

[6]  Rahul C. Basole,et al.  Visualization to understand ecosystems , 2016, Commun. ACM.

[7]  G. Fragidis,et al.  Conceptual and Business Models for Customer-Centric Business Ecosystems , 2007, 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference.

[8]  Dominique L. Scapin,et al.  Ergonomic criteria for evaluating the ergonomic quality of interactive systems , 1997, Behav. Inf. Technol..

[9]  Enrico Motta,et al.  SCARLET: SemantiC RelAtion DiscoveRy by Harvesting OnLinE OnTologies , 2008, ESWC.

[10]  Jan Pries-Heje,et al.  FEDS: a Framework for Evaluation in Design Science Research , 2016, Eur. J. Inf. Syst..

[11]  Shawn M. Douglas,et al.  PubNet: a flexible system for visualizing literature derived networks , 2005, Genome Biology.

[12]  Hany H. Ammar,et al.  Investigate, Identify and Estimate the Technical Debt: A Systematic Mapping Study , 2018, SSRN Electronic Journal.

[13]  Elena Paslaru Bontas Simperl,et al.  The Trials and Tribulations of Working with Structured Data: -a Study on Information Seeking Behaviour , 2017, CHI.

[14]  Sven-Volker Rehm,et al.  Using Information Systems in Innovation Networks: Uncovering Network Resources , 2017, J. Assoc. Inf. Syst..

[15]  Alessandro Bassi,et al.  From today's INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view , 2010, IEEE Wireless Communications.

[16]  Kai Petersen,et al.  Systematic Mapping Studies in Software Engineering , 2008, EASE.

[17]  Júlio Cesar dos Reis,et al.  Interaction design of social software: Clarifying requirements through a culturally aware artifact , 2011, International Conference on Information Society (i-Society 2011).

[18]  Florian Matthes,et al.  Modeling and Visualizing Smart City Mobility Business Ecosystems: Insights from a Case Study , 2018, Inf..

[19]  Carlos Juiz,et al.  A lightweight decentralized service placement policy for performance optimization in fog computing , 2018, Journal of Ambient Intelligence and Humanized Computing.

[20]  Alberto Sillitti,et al.  An Analysis of Automated Technical Debt Measurement , 2019, ICEIS.

[21]  L. R. Dice Measures of the Amount of Ecologic Association Between Species , 1945 .

[22]  Jarke J. van Wijk,et al.  The value of visualization , 2005, VIS 05. IEEE Visualization, 2005..

[23]  Eduardo Castelló Ferrer The blockchain: a new framework for robotic swarm systems , 2016, Proceedings of the Future Technologies Conference (FTC) 2018.

[24]  Anthony McIsaac,et al.  A Semantic Condition for Data Independence and Applications in Hardware Verification , 2009, Electron. Notes Theor. Comput. Sci..

[25]  Subutai Ahmad,et al.  Evaluating Real-Time Anomaly Detection Algorithms -- The Numenta Anomaly Benchmark , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).

[26]  Alan Davy,et al.  Resource aware placement of IoT application modules in Fog-Cloud Computing Paradigm , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[27]  Kim G. Larsen,et al.  Time-Optimal Real-Time Test Case Generation Using Uppaal , 2003, FATES.

[28]  Dalia Guerreiro,et al.  Research and Advanced Technology for Digital Libraries , 1997, Lecture Notes in Computer Science.

[29]  Shiva Agarwal,et al.  Sustaining Superior Performance in Business Ecosystems: Evidence from Application Software Developers in the iOS and Android Smartphone Ecosystems , 2017, Organ. Sci..

[30]  Daniel A. Menascé,et al.  Self-protecting and self-optimizing database systems: implementation and experimental evaluation , 2013, CAC.

[31]  Mohamed Jmaiel,et al.  Selective Test Generation Approach for Testing Dynamic Behavioral Adaptations , 2015, ICTSS.

[32]  Eetu Luoma,et al.  Defining an Internet-of-Things Ecosystem , 2012, NEW2AN.

[33]  Jorge R. B. Garay,et al.  Architecture for sensor networks in cyber-physical system , 2010, 2010 IEEE Latin-American Conference on Communications.

[34]  Audun Vennesland,et al.  Matcher composition for identification of subsumption relations in ontology matching , 2017, WI.

[35]  Kartik Asooja,et al.  Monolingual and cross-lingual ontology matching with CIDER-CL: evaluation report for OAEI 2013 , 2013, OM.

[36]  Eetu Luoma,et al.  Network Analysis of Platform Ecosystems: The Case of Internet of Things Ecosystem , 2015, ICSOB.

[37]  Ondrej Zach,et al.  Identifying reasons for ERP system customization in SMEs: a multiple case study , 2012, J. Enterp. Inf. Manag..

[38]  Les Gasser,et al.  A Design Theory for Systems That Support Emergent Knowledge Processes , 2002, MIS Q..

[39]  Hazura Zulzalil,et al.  A Systematic Mapping Study on the Customization Solutions of Software as a Service Applications , 2019, IEEE Access.

[40]  Diane M. Strong,et al.  A framework for evaluating ERP implementation choices , 2004, IEEE Transactions on Engineering Management.

[41]  Tuure Tuunanen,et al.  Design Science Research Evaluation , 2012, DESRIST.

[42]  J. E. Forrest,et al.  Strategic Alliances between Large and Small Research Intensive Organizations: Experiences in the Biotechnology Industry , 1992 .

[43]  M. Kessentini,et al.  A Systematic Literature Review , 2016 .

[44]  Marko Vukolic,et al.  Blockchain Consensus Protocols in the Wild , 2017, DISC.

[45]  Chris J. Myers,et al.  Automatic abstraction for verification of cyber-physical systems , 2010, ICCPS '10.

[46]  Exploiting Structure within Data for Accurate Labeling using Conditional Random Fields , 2012 .

[47]  Simon Knight,et al.  Action-oriented, Accountable, and Inter(Active) Learning Analytics for Learners , 2016, LAL@LAK.

[48]  Moez Krichen,et al.  A formal framework for black-box conformance testing of distributed real-time systems , 2012, Int. J. Crit. Comput. Based Syst..

[49]  Ali A. Ghorbani,et al.  Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.

[50]  Jen-Her Wu,et al.  A methodology for ERP misfit analysis , 2007, Inf. Manag..

[51]  Norman Spangenberg,et al.  Applying machine learning to big data streams : An overview of challenges , 2017, 2017 IEEE 4th International Conference on Soft Computing & Machine Intelligence (ISCMI).

[52]  Slinger Jansen,et al.  A sense of community: A research agenda for software ecosystems , 2009, 2009 31st International Conference on Software Engineering - Companion Volume.

[53]  Zhenyu Wen,et al.  Fog Orchestration for Internet of Things Services , 2017, IEEE Internet Computing.

[54]  Stanley G. Harris,et al.  Functions of Parting CEremonies in Dying Organizations , 1986 .

[55]  Jiangtao Wen,et al.  The IoT electric business model: Using blockchain technology for the internet of things , 2016, Peer-to-Peer Networking and Applications.

[56]  Christine Legner,et al.  New Avenues for Theoretical Contributions in Enterprise Architecture Principles - A Literature Review , 2012, TEAR/PRET.

[57]  Henderik Alex Proper,et al.  Architecture Principles - The Cornerstones of Enterprise Architecture , 2011, The Enterprise Engineering Series.

[58]  H. Isil Bozma,et al.  Coalition formation games for dynamic multirobot tasks , 2016, Int. J. Robotics Res..

[59]  K. Eisenhardt Building theories from case study research , 1989, STUDI ORGANIZZATIVI.

[60]  Stavros Tripakis,et al.  Conformance testing for real-time systems , 2009, Formal Methods Syst. Des..

[61]  John T. Stasko,et al.  Visual Analytics for Converging-Business-Ecosystem Intelligence , 2012, IEEE Computer Graphics and Applications.

[62]  Jie-Hong Roland Jiang,et al.  Scalable exploration of functional dependency by interpolation and incremental SAT solving , 2007, 2007 IEEE/ACM International Conference on Computer-Aided Design.

[63]  Graçaliz Pereira Dimuro,et al.  The Gold Tree: An Information System for Analyzing Academic Genealogy , 2019, ICEIS.

[64]  Rajkumar Buyya,et al.  Latency-Aware Application Module Management for Fog Computing Environments , 2018, ACM Trans. Internet Techn..

[65]  E. Vuori,et al.  Business Ecosystem as the New Approach to Complex Adaptive Business Environments , 2008 .

[66]  Florian Matthes,et al.  An Agile Framework for Modeling Smart City Business Ecosystems , 2018, ICEIS.

[67]  Forrest Shull,et al.  Understanding automated and human-based technical debt identification approaches-a two-phase study , 2019, Journal of the Brazilian Computer Society.

[68]  Eugene Larkin,et al.  Multi-agent Approach for Distributed Information Systems Reliability Prediction , 2017 .

[69]  Kristin A. Cook,et al.  Illuminating the Path: The Research and Development Agenda for Visual Analytics , 2005 .

[70]  Nikolay Teslya,et al.  Blockchain-based platform architecture for industrial IoT , 2017, 2017 21st Conference of Open Innovations Association (FRUCT).

[71]  Neil Rubens,et al.  Exploring Innovation Ecosystems as Networks: Four European Cases , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[72]  Valentina Ivanova,et al.  A unified approach for debugging is-a structure and mappings in networked taxonomies , 2013, J. Biomed. Semant..

[73]  Rita Goreti Amaral,et al.  Influência da adequabilidade da amostra sobre a detecção das lesões precursoras do câncer cervical , 2008 .

[74]  Nataliia Rümmele,et al.  Evaluating Approaches for Supervised Semantic Labeling , 2018, LDOW@WWW.

[75]  R. Stamper Signs, Information, Norms and Systems , 1996 .

[76]  Ilia Bider,et al.  Defining Transformational Patterns for Business Model Innovation , 2018, BIR.

[77]  Yifan Hu,et al.  Efficient, High-Quality Force-Directed Graph Drawing , 2006 .

[78]  Ryan Rumble,et al.  How to use analogies for creative business modelling , 2017 .

[79]  Francisco Martins,et al.  Automatic Decomposition of IoT Aware Business Processes with Data and Control Flow Distribution , 2019, ICEIS.

[80]  Mariam Lahami,et al.  A model-based approach to combine conformance and load tests: an eHealth case study , 2018, Int. J. Crit. Comput. Based Syst..

[81]  Júlio Cesar dos Reis,et al.  Search informed by a semiotic approach in Social Network Services , 2010, 2010 10th Annual International Conference on New Technologies of Distributed Systems (NOTERE).

[82]  Roberto Verdecchia Identifying Architectural Technical Debt in Android Applications through Automated Compliance Checking , 2018, 2018 IEEE/ACM 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft).

[83]  Tobias Meisen,et al.  A Web-based UI to Enable Semantic Modeling for Everyone , 2018, SEMANTICS.

[84]  Mohamed Jmaiel,et al.  Conformance Testing of WS-BPEL Compositions under Various Load Conditions , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.

[85]  David A. Wheeler More Than a Gigabuck: Estimating GNU/Linux''s Size , 2002, WWW 2002.

[86]  Clarisse Sieckenius de Souza,et al.  Uso de design probes no design de tecnologias para terapeutas de crianças com autismo , 2014, IHC.

[87]  Csaba Kardos,et al.  Decomposition approach to optimal feature-based assembly planning , 2017 .

[88]  Roy Wendler,et al.  The maturity of maturity model research: A systematic mapping study , 2012, Inf. Softw. Technol..

[89]  Kecheng Liu,et al.  Understanding the roles of signs and norms in organizations - a semiotic approach to information systems design , 2000, Behav. Inf. Technol..

[90]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[91]  Gerhard Weikum,et al.  The Mentor project: steps towards enterprise-wide workflow management , 1996, Proceedings of the Twelfth International Conference on Data Engineering.

[92]  Diane J. Cook,et al.  CASAS: A Smart Home in a Box , 2013, Computer.

[93]  Ramesh Govindan,et al.  Sensor faults: Detection methods and prevalence in real-world datasets , 2010, TOSN.

[94]  Daniel A. Menascé,et al.  DARE: A Distributed Adaptation and Failure Recovery Framework for Software Systems , 2017, 2017 IEEE International Conference on Autonomic Computing (ICAC).

[95]  Bill Greene Agile methods applied to embedded firmware development , 2004, Agile Development Conference.

[96]  Annika Pettersson,et al.  Service-Oriented Architecture (SOA) Quality Attributes - A Research Model , 2007 .

[97]  Gyu Myoung Lee,et al.  The Internet of Things — A problem statement , 2010, 2010 International Conference on Information and Communication Technology Convergence (ICTC).

[98]  Birgit Vogel-Heuser,et al.  Metrics for software quality in automated production systems as an indicator for technical debt , 2017, 2017 13th IEEE Conference on Automation Science and Engineering (CASE).

[99]  Alberto Sillitti,et al.  Investigating the Usefulness of Pair-Programming in a Mature Agile Team , 2008, XP.

[100]  Felix Larrinaga,et al.  Implementation of a Reference Architecture for Cyber Physical Systems to support Condition Based Maintenance , 2018, 2018 5th International Conference on Control, Decision and Information Technologies (CoDIT).

[101]  Cássia Trojahn,et al.  Exploiting BabelNet for generating subsumption , 2018, OM@ISWC.

[102]  Agnieszka Radziwon,et al.  Innovation, entrepreneurial, knowledge, and business ecosystems: Old wine in new bottles? , 2017, Technological Forecasting and Social Change.

[103]  Thomas R. Gulledge ERP gap-fit analysis from a business process orientation , 2006, Int. J. Serv. Stand..

[104]  Adam Dunkels,et al.  A database in every sensor , 2011, SenSys.

[105]  Rodrigo Kazuo Ikenami,et al.  Unpacking the innovation ecosystem construct: Evolution, gaps and trends , 2016, Technological Forecasting and Social Change.

[106]  Hamid H. Jebur,et al.  Machine Learning Techniques for Anomaly Detection: An Overview , 2013 .

[107]  Robert Winter,et al.  Construction and Evaluation of a Meta-Model for Enterprise Architecture Design Principles , 2011, Wirtschaftsinformatik.

[108]  M. Cecilia C. Baranauskas,et al.  Guiding the Process of Requirements Elicitation with a Semiotic-based Approach A Case Study , 2005 .

[109]  David L. Dill,et al.  State reduction using reversible rules , 1996, DAC '96.

[110]  Christine Nadel,et al.  Case Study Research Design And Methods , 2016 .

[111]  Tobias Bachmeier,et al.  Business Model Generation A Handbook For Visionaries Game Changers And Challengers , 2016 .

[112]  Moez Krichen,et al.  Study on the Limitations of WS-BPEL Compositions Under Load Conditions , 2015, Comput. J..

[113]  Rahul C. Basole,et al.  Visual decision support for business ecosystem analysis , 2016, Expert Syst. Appl..

[114]  Robert K. Brayton,et al.  Functional Dependency for Verification Reduction , 2004, CAV.

[115]  Yves Bertot,et al.  Interactive Theorem Proving and Program Development: Coq'Art The Calculus of Inductive Constructions , 2010 .

[116]  R. Slot,et al.  UvA-DARE ( Digital Academic Repository ) A method for valuing architecture-based business transformation and measuring the value of solutions architecture , 2010 .

[117]  Ana Respício,et al.  Automatic Decomposition of IoT Aware Business Processes - a Pattern Approach , 2019, CENTERIS/ProjMAN/HCist.

[118]  Ashley A. Bush,et al.  Platform Evolution: Coevolution of Platform Architecture, Governance, and Environmental Dynamics , 2010 .

[119]  Marta Z. Kwiatkowska,et al.  Symmetry Reduction for Probabilistic Model Checking , 2006, CAV.

[120]  Sepideh Ghanavati,et al.  Measuring and managing the design restriction of enterprise architecture (EA) principles on EA models , 2015, 2015 IEEE Eighth International Workshop on Requirements Engineering and Law (RELAW).

[121]  R. Stamper Information in business and administrative systems , 1973 .

[122]  Melquicedec Lozano,et al.  Ecosystem for the emergence of spin-offs from the family business , 2017 .

[123]  Roberto Marcondes,et al.  PROSPECÇÃO DE DADOS ACADÊMICOS DE CURRÍCULOS LATTES ATRAVÉS DE SCRIPTLATTES , 2013 .

[124]  James F. Moore The Death of Competition: Leadership and Strategy in the Age of Business Ecosystems , 1996 .

[125]  Sven-Volker Rehm,et al.  Towards Design Principles for Visualizing Business Ecosystems , 2019, ICEIS.

[126]  Kurt Sandkuhl,et al.  The Nature and a Process for Development of Enterprise Architecture Principles , 2015, BIS.

[127]  Earl R. Babbie,et al.  The practice of social research , 1969 .

[128]  Tobias Meisen,et al.  Applying Semantics to Reduce the Time to Analytics within Complex Heterogeneous Infrastructures , 2018, Technologies.

[129]  M. Miles,et al.  Drawing Valid Meaning from Qualitative Data: Toward a Shared Craft , 1984 .

[130]  Maria Cecília Calani Baranauskas,et al.  Affectibility in Educational Technologies: A Socio-Technical Perspective for Design , 2013, J. Educ. Technol. Soc..

[131]  Jagruti Sahoo,et al.  A coalition formation algorithm for Multi-Robot Task Allocation in large-scale natural disasters , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[132]  Romuere Rôdrigues Veloso e Silva,et al.  A multi-objective approach for calibration and detection of cervical cells nuclei , 2017, 2017 IEEE Congress on Evolutionary Computation (CEC).

[133]  Oscar Pastor,et al.  Assessing the reproducibility and accuracy of functional size measurement methods through experimentation , 2004, Proceedings. 2004 International Symposium on Empirical Software Engineering, 2004. ISESE '04..

[134]  Maria Beatriz Felgar de Toledo,et al.  Quality of Service Management for Web Service Compositions , 2008, 2008 11th IEEE International Conference on Computational Science and Engineering.

[135]  Boris Motik,et al.  HermiT: An OWL 2 Reasoner , 2014, Journal of Automated Reasoning.

[136]  Wil M. P. van der Aalst,et al.  A survey of patterns for Service-Oriented Architectures , 2006, Int. J. Internet Protoc. Technol..

[137]  Sven-Volker Rehm,et al.  Using information systems to achieve complementarity in SME innovation networks , 2017, Inf. Manag..

[138]  Ruggero Golini,et al.  International development projects by non-governmental organizations: an evaluation of the need for specific project management and appraisal tools , 2014 .

[139]  Witold Abramowicz,et al.  SQuaRE based web services quality model , 2008 .

[140]  Quan Z. Sheng,et al.  Quality driven web services composition , 2003, WWW '03.

[141]  Neoklis Polyzotis,et al.  Data Management Challenges in Production Machine Learning , 2017, SIGMOD Conference.

[142]  Apostolos Ampatzoglou,et al.  Estimating the breaking point for technical debt , 2015, 2015 IEEE 7th International Workshop on Managing Technical Debt (MTD).

[143]  C. Warren Axelrod Managing the risks of cyber-physical systems , 2013, 2013 IEEE Long Island Systems, Applications and Technology Conference (LISAT).

[144]  Dejan Pajk,et al.  Fit Gap Analysis – The Role of Business Process Reference Models , 2014 .

[145]  Haixun Wang,et al.  Understanding Tables on the Web , 2012, ER.

[146]  Frank Harmsen,et al.  Case Report of Identifying and Measuring IT Architecture Principles in the Dutch Tax Agency , 2016, 2016 IEEE 18th Conference on Business Informatics (CBI).

[147]  Florian Matthes,et al.  Towards a Data Science Environment for Modeling Business Ecosystems: The Connected Mobility Case , 2017, ADBIS.

[148]  Han Liu,et al.  Challenges of Big Data Analysis. , 2013, National science review.

[149]  Fevzi Belli,et al.  Advancing test automation technology to meet the challenges of model-based software testing - Guest editors' introduction to the special section of the Third IEEE International Workshop on Automation of Software Test (AST 2008) , 2009, Inf. Softw. Technol..

[150]  Dimitrios Gunopulos,et al.  Efficient indexing data structures for flash-based sensor devices , 2006, TOS.

[151]  Janis Grabis,et al.  Optimization of Gaps Resolution Strategy in Implementation of ERP Systems , 2019, ICEIS.

[152]  Nathalie Bertrand,et al.  Off-line test selection with test purposes for non-deterministic timed automata , 2012, Log. Methods Comput. Sci..

[153]  Ramon Lawrence,et al.  Adapting Linear Hashing for Flash Memory Resource-constrained Embedded Devices , 2019, ICEIS.

[154]  Milene Selbach Silveira,et al.  Bringing Life to the Classroom: Engaging Students through the Integration of HCI in SE Projects , 2019, ICEIS.

[155]  S. Rajsbaum Foundations of Cryptography , 2014 .

[156]  Marcone J. F. Souza,et al.  An Iterated Local Search Algorithm for Cell Nuclei Detection from Pap Smear Images , 2019, ICEIS.

[157]  Dean Leffingwell,et al.  Agile Software Requirements: Lean Requirements Practices for Teams, Programs, and the Enterprise , 2011 .

[158]  N. R. Jennings,et al.  To appear in: Int Journal of Group Decision and Negotiation GDN2000 Keynote Paper Automated Negotiation: Prospects, Methods and Challenges , 2022 .

[159]  Ramon Lawrence,et al.  Experimental Evaluation of Hash Function Performance on Embedded Devices , 2018, 2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE).

[160]  Zhu Han,et al.  Computing Resource Allocation in Three-Tier IoT Fog Networks: A Joint Optimization Approach Combining Stackelberg Game and Matching , 2017, IEEE Internet of Things Journal.

[161]  Christine Legner,et al.  Enterprise Architecture Principles In Research And Practice: Insights From An Exploratory Analysis , 2013, ECIS.

[162]  Felix Salfner,et al.  Lessons Learned from the ProDebt Research Project on Planning Technical Debt Strategically , 2017, PROFES.

[163]  Steve R. Palmer,et al.  A Practical Guide to Feature-Driven Development , 2002 .

[164]  R. K. Shyamasundar,et al.  SLA Monitor: A System for Dynamic Monitoring of Adaptive Web Services , 2011, 2011 IEEE Ninth European Conference on Web Services.

[165]  Rajeev Alur,et al.  A Theory of Timed Automata , 1994, Theor. Comput. Sci..

[166]  David J. Teece,et al.  Dynamic capabilities and (digital) platform lifecycles , 2017 .

[167]  Yee Ming Chen,et al.  Multiagent approach to solve project team work allocation problems , 2009 .

[168]  W. Buxton Human-Computer Interaction , 1988, Springer Berlin Heidelberg.

[169]  Apostolos Ampatzoglou,et al.  The financial aspect of managing technical debt: A systematic literature review , 2015, Inf. Softw. Technol..

[170]  Slinger Jansen,et al.  Software ecosystems: a software ecosystem strategy assessment model , 2010, ECSA '10.

[171]  Luc Bouganim,et al.  Memory Requirements for Query Execution in Highly Constrained Devices , 2003, VLDB.

[172]  Marlon Dumas,et al.  Heuristics for composite Web service decentralization , 2014, Software & Systems Modeling.

[173]  Sven-Volker Rehm,et al.  Visualizing Platform Hubs of Smart City Mobility Business Ecosystems , 2017, ICIS.

[174]  Mohamed Jmaiel,et al.  Safe and efficient runtime testing framework applied in dynamic and distributed systems , 2016, Sci. Comput. Program..

[175]  C. North,et al.  Visual to Parametric Interaction (V2PI) , 2013, PloS one.

[176]  Selim Aksoy,et al.  Unsupervised segmentation and classification of cervical cell images , 2012, Pattern Recognit..

[177]  Mohamed Jmaiel,et al.  Model-Based Conformance Testing of WS-BPEL Compositions , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops.

[178]  Stavros Tripakis,et al.  A Simplified Approach for Testing Real-Time Systems Based on Action Refinement , 2007, ISoLA.

[179]  D. L. Parnas,et al.  On the criteria to be used in decomposing systems into modules , 1972, Software Pioneers.

[180]  Jan Bosch,et al.  Speed, Data, and Ecosystems: The Future of Software Engineering , 2016, IEEE Software.

[181]  Karl Kurbel,et al.  Understanding the Flexibility of Cloud ERP Software , 2016, ERP Future.

[182]  Ita Richardson,et al.  Using the PMBOK Guide to Frame GSD Coordination Strategies , 2013, 2013 IEEE 8th International Conference on Global Software Engineering.

[183]  C. Norris Ip,et al.  Generalized Reversible Rules , 1998, FMCAD.

[184]  Jing Liu,et al.  A Graph Based Technique of Process Partitioning , 2018, J. Web Eng..

[185]  Francisco Martins,et al.  Modelling IoT behaviour within BPMN Business Processes , 2017 .

[186]  Mari Sako,et al.  Business ecosystems , 2018, Commun. ACM.

[187]  Wayne H. Wolf,et al.  Cyber-physical Systems , 2009, Computer.

[188]  Alysson Bessani,et al.  A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform , 2017, 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[189]  Dirk Stelzer,et al.  Enterprise Architecture Principles: Literature Review and Research Directions , 2009, ICSOC/ServiceWave Workshops.

[190]  Eduardo Mena,et al.  On the generalization of the discovery of subsumption relationships to the fuzzy case , 2017, 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[191]  Baowen Xu,et al.  A Framework of Checking Subsumption Relations Between Composite Concepts in Different Ontologies , 2005, KES.

[192]  Francisco Martins,et al.  Decentralising Internet of Things Aware BPMN Business Processes , 2014, S-CUBE.

[193]  Jim Johnson,et al.  CHAOS Chronicles, Focusing on Failures and Possible Improvements in IT Projects , 2016 .

[194]  Rahul C. Basole,et al.  Revealing the API ecosystem and enterprise strategy via visual analytics , 2016, Commun. ACM.

[195]  Xavier Masip-Bruin,et al.  Handling service allocation in combined Fog-cloud scenarios , 2016, 2016 IEEE International Conference on Communications (ICC).

[196]  Thomas Wahl,et al.  Replication and Abstraction: Symmetry in Automated Formal Verification , 2010, Symmetry.

[197]  Shan Suthaharan,et al.  Big data classification: problems and challenges in network intrusion prediction with machine learning , 2014, PERV.

[198]  Pearl Brereton,et al.  Using mapping studies as the basis for further research - A participant-observer case study , 2011, Inf. Softw. Technol..

[199]  Ward Cunningham,et al.  The WyCash portfolio management system , 1992, OOPSLA '92.

[200]  Jane Yung-jen Hsu,et al.  Co-locating services in IoT systems to minimize the communication energy cost , 2014, J. Innov. Digit. Ecosyst..

[201]  Helwig Hauser,et al.  Designing Progressive and Interactive Analytics Processes for High-Dimensional Data Analysis , 2017, IEEE Transactions on Visualization and Computer Graphics.

[202]  Stephen V. David,et al.  Neurotree: A Collaborative, Graphical Database of the Academic Genealogy of Neuroscience , 2012, PloS one.

[203]  Frank Maurer,et al.  Extreme Programming: Rapid Development for Web-Based Applications , 2002, IEEE Internet Comput..

[204]  Norman Spangenberg,et al.  An Architectural Blueprint for a Multi-purpose Anomaly Detection on Data Streams , 2019, ICEIS.

[205]  Harm-Jan Steenhuis,et al.  Building theories from case study research: the progressive case study , 2006 .

[206]  Lucia Vilela Leite Filgueiras,et al.  Customizing a communication device for a child with cerebral palsy using participatory design practices: contributions towards the PD4CAT method , 2012, IHC.

[207]  Miriam A. M. Capretz,et al.  Machine Learning With Big Data: Challenges and Approaches , 2017, IEEE Access.

[208]  Eric Britsman,et al.  Identifying Technical Debt Impact on Maintenance Effort - - An Industrial Case Study , 2015 .

[209]  Fabrício Benevenuto,et al.  Extracting academic genealogy trees from the networked digital library of theses and dissertations , 2016, 2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL).

[210]  Horst Lichter,et al.  Designing a Next-Generation Continuous Software Delivery System: Concepts and Architecture , 2018, 2018 IEEE/ACM 4th International Workshop on Rapid Continuous Software Engineering (RCoSE).

[211]  Eliane Zambon Victorelli,et al.  Participatory Evaluation of Human-Data Interaction Design Guidelines , 2019, INTERACT.

[212]  Robert Winter,et al.  What Is an Enterprise Architecture Principle? - Towards a Consolidated Definition , 2010, Computer and Information Science.

[213]  Alan R. Hevner,et al.  Design Science in Information Systems Research , 2004, MIS Q..

[214]  Jitendra Malik,et al.  Learning a classification model for segmentation , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.

[215]  Mariusz Bajger,et al.  Spatial Shape Constrained Fuzzy C-Means (FCM) Clustering for Nucleus Segmentation in Pap Smear Images , 2016, 2016 International Conference on Digital Image Computing: Techniques and Applications (DICTA).

[216]  Jim A. McCall,et al.  Factors in Software Quality. Volume-III. Preliminary Handbook on Software Quality for an Acquisiton Manager , 1977 .

[217]  John T. Stasko,et al.  BEST PAPER: A Knowledge Task-Based Framework for Design and Evaluation of Information Visualizations , 2004, IEEE Symposium on Information Visualization.

[218]  Ian Horrocks,et al.  An Introduction to Description Logic , 2017 .

[219]  M. Gordon,et al.  Introduction to HOL: a theorem proving environment for higher order logic , 1993 .

[220]  T. Stützle,et al.  Iterated Local Search: Framework and Applications , 2018, Handbook of Metaheuristics.

[221]  Omar El Sawy,et al.  Building an Information System Design Theory for Vigilant EIS , 1992, Inf. Syst. Res..

[222]  B. Rosner Percentage Points for a Generalized ESD Many-Outlier Procedure , 1983 .

[223]  Hamed Haddadi,et al.  Human-Data Interaction: The Human Face of the Data-Driven Society , 2014, ArXiv.

[224]  Qiang Liu,et al.  Debugging the missing is-a structure within taxonomies networked by partial reference alignments , 2013, Data Knowl. Eng..

[225]  Vladimir Batagelj,et al.  Pajek - Analysis and Visualization of Large Networks , 2004, Graph Drawing Software.

[226]  Zarinah M. Kasirun,et al.  Automating Function Points analysis based on functional and non functional requirements text , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).

[227]  Jesse Read,et al.  Data Stream Classification Using Random Feature Functions and Novel Method Combinations , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[228]  Jeff Z. Pan,et al.  On Serializable Incremental Semantic Reasoners , 2017, K-CAP.

[229]  Adamantios Koumpis,et al.  The Impact Of Customer Participation On Business Ecosystems , 2007, Virtual Enterprises and Collaborative Networks.

[230]  John T. Stasko,et al.  Understanding Interfirm Relationships in Business Ecosystems with Interactive Visualization , 2013, IEEE Transactions on Visualization and Computer Graphics.

[231]  Alexander V. Smirnov,et al.  Context-Aware Decision Support in Socio-Cyberphysical Systems: From Smart Space-Based Applications to Human-Computer Cloud Services , 2017, PAAMS.

[232]  Keshav Pingali,et al.  The program structure tree: computing control regions in linear time , 1994, PLDI '94.

[233]  Moutaz Haddara,et al.  ERP and Organizational Misfits: An ERP Customization Journey , 2016, CENTERIS/ProjMAN/HCist.

[234]  Sonja Filiposka,et al.  Community-based allocation and migration strategies for fog computing , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[235]  Florian Matthes,et al.  Collectively Constructing the Business Ecosystem: Towards Crowd-Based Modeling for Platforms and Infrastructures , 2018, ICEIS.

[236]  Jouni Markkula,et al.  Innovation in Evolving Business Ecosystem: A Case Study of Information Technology-Based Future Health and Exercise Service , 2015 .

[237]  Shih-Ting Huang,et al.  Business Model Innovation with Effective Innovation: An Exploratory Study on TSMC , 2006, 2006 IEEE International Symposium on Semiconductor Manufacturing.

[238]  Wei Hong,et al.  TinyDB: an acquisitional query processing system for sensor networks , 2005, TODS.

[239]  Simone Diniz Junqueira Barbosa,et al.  Eliciting Requirements Using Personas and Empathy Map to Enhance the User Experience , 2015, 2015 29th Brazilian Symposium on Software Engineering.

[240]  Andy Neely,et al.  Governing the City , 2016 .

[241]  Salvatore Venticinque,et al.  A methodology for deployment of IoT application in fog , 2018, Journal of Ambient Intelligence and Humanized Computing.

[242]  Friederich Kupzog,et al.  Requirements for real-time hardware integration into cyber-physical energy system simulation , 2015, 2015 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES).

[243]  Gustavo Carneiro,et al.  An Improved Joint Optimization of Multiple Level Set Functions for the Segmentation of Overlapping Cervical Cells , 2015, IEEE Transactions on Image Processing.

[244]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[245]  Ghassan Hamarneh,et al.  Evaluation of Three Algorithms for the Segmentation of Overlapping Cervical Cells , 2017, IEEE Journal of Biomedical and Health Informatics.

[246]  Richard T. Vidgen,et al.  An exploration of technical debt , 2013, J. Syst. Softw..

[247]  Daniel A. Menascé,et al.  Efficient modeling and optimizing of checkpointing in concurrent component-based software systems , 2018, J. Syst. Softw..

[248]  Bing Bai,et al.  Dynamic complexity of mobile internet business ecosystem , 2017, 2017 4th International Conference on Systems and Informatics (ICSAI).

[249]  Luciana P. Nedel,et al.  Evaluating Usability of Information Visualization Techniques , 2002 .

[250]  Anne Faber,et al.  Towards a Visual Language Approach for Modeling Business Ecosystems , 2017, PoEM Doctoral Consortium.

[251]  Florian Matthes,et al.  Visualizing Business Ecosystems: Results of a Systematic Mapping Study , 2019, ICEIS.

[252]  Yong Xiang,et al.  Cost Efficient Resource Management in Fog Computing Supported Medical Cyber-Physical System , 2017, IEEE Transactions on Emerging Topics in Computing.

[253]  Miguel Mira da Silva,et al.  iThink: A Game-Based Approach Towards Improving Collaboration and Participation in Requirement Elicitation , 2012, VS-GAMES.

[254]  Sérgio Soares,et al.  The Impact of Scrum on Customer Satisfaction: An Empirical Study , 2013, 2013 27th Brazilian Symposium on Software Engineering.

[255]  Diane J. Cook,et al.  A survey of methods for time series change point detection , 2017, Knowledge and Information Systems.

[256]  Daniel A. Menascé,et al.  Resource Allocation for Autonomic Data Centers using Analytic Performance Models , 2005, Second International Conference on Autonomic Computing (ICAC'05).

[257]  Kristina Lerman,et al.  Using Conditional Random Fields to Exploit Token Structure and Labels for Accurate Semantic Annotation , 2011, AAAI.

[258]  Tobias Meisen,et al.  ESKAPE: Information Platform for Enabling Semantic Data Processing , 2017, ICEIS.

[259]  Bill Curtis,et al.  Estimating the size, cost, and types of Technical Debt , 2012, 2012 Third International Workshop on Managing Technical Debt (MTD).

[260]  Gunter Saake,et al.  Business Process Modeling Language for Performance Evaluation , 2014, 2014 47th Hawaii International Conference on System Sciences.

[261]  Luciano Baresi,et al.  An Introduction to Software Testing , 2006, FoVMT.

[262]  Klaus Moessner,et al.  Predictive Analytics for Complex IoT Data Streams , 2017, IEEE Internet of Things Journal.

[263]  M. Sheelagh T. Carpendale,et al.  Theoretical analysis of uncertainty visualizations , 2006, Electronic Imaging.

[264]  Antonio F. Gómez-Skarmeta,et al.  How can We Tackle Energy Efficiency in IoT Based Smart Buildings? , 2014, Sensors.

[265]  C. Gersick Time and Transition in Work Teams: Toward a New Model of Group Development , 1988 .

[266]  Kleanthis Thramboulidis,et al.  Cyber-physical microservices: An IoT-based framework for manufacturing systems , 2018, 2018 IEEE Industrial Cyber-Physical Systems (ICPS).

[267]  Inder Monga,et al.  Lambda architecture for cost-effective batch and speed big data processing , 2015, 2015 IEEE International Conference on Big Data (Big Data).

[268]  Yuanfang Cai,et al.  Comparing four approaches for technical debt identification , 2014, Software Quality Journal.

[269]  Karl Michael Popp,et al.  Goals of Software Vendors for Partner Ecosystems - A Practitioner's View , 2010, ICSOB.

[270]  Watson Wei Khong Chua,et al.  Discovering Cross-Ontology Subsumption Relationships by Using Ontological Annotations on Biomedical Literature , 2012, ICBO.

[271]  Christian Berger,et al.  Supporting Agile Change Management by Scenario-Based Regression Simulation , 2010, IEEE Transactions on Intelligent Transportation Systems.

[272]  CernyTomas,et al.  Contextual understanding of microservice architecture , 2018 .

[273]  Mary Roth,et al.  Data Wrangling: The Challenging Yourney from the Wild to the Lake , 2015, CIDR.

[274]  Amit P. Sheth,et al.  Machine learning for Internet of Things data analysis: A survey , 2017, Digit. Commun. Networks.

[275]  Guilherme Horta Travassos,et al.  A Picture from the Model-Based Testing Area: Concepts, Techniques, and Challenges , 2010, Adv. Comput..

[276]  Mathias Weske,et al.  Business Process Management: Concepts, Languages, Architectures , 2007 .

[277]  Aditya G. Parameswaran,et al.  Towards Visualization Recommendation Systems , 2016, SGMD.

[278]  Jennifer Preece,et al.  Designing and evaluating online communities: research speaks to emerging practice , 2004, Int. J. Web Based Communities.

[279]  Elaine Shi,et al.  Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab , 2016, Financial Cryptography Workshops.

[280]  Murat Dundar,et al.  Learning Classifiers When the Training Data Is Not IID , 2007, IJCAI.

[281]  Dimitris Dranidis,et al.  Towards Run-Time Monitoring of Web Services Conformance to Business-Level Agreements , 2010, TAIC PART.

[282]  Andreas Holzinger,et al.  Extravaganza Tutorial on Hot Ideas for Interactive Knowledge Discovery and Data Mining in Biomedical Informatics , 2014, Brain Informatics and Health.

[283]  Francisco J. Pino,et al.  Analysis of the Software Implementation Process for ERP Systems , 2017 .

[284]  Karem A. Sakallah,et al.  Automatic abstraction and verification of verilog models , 2004, Proceedings. 41st Design Automation Conference, 2004..

[285]  Saul A. Kripke,et al.  Semantical Considerations on Modal Logic , 2012 .

[286]  P. Avgeriou,et al.  Establishing a framework for managing interest in technical debt , 2015, BMSD 2015.

[287]  Thomas Reschenhofer,et al.  Empowering End-users to Collaboratively Analyze Evolving Complex Linked Data , 2017 .

[288]  Robert Winter,et al.  How are Enterprise Architecture Design Principles Used? , 2011, 2011 IEEE 15th International Enterprise Distributed Object Computing Conference Workshops.

[289]  Witold Abramowicz,et al.  Decomposition of SQuaRE – Based Requirements for the Needs of SOA Applications , 2009 .

[290]  Jignesh M. Patel,et al.  Big data and its technical challenges , 2014, CACM.

[291]  Frank Harmsen,et al.  Strengthen the Architecture Principle Definition and Its Characteristics - A Survey Encompassing 27 Years of Architecture Principle Literature , 2018, ICEIS.

[292]  M. Jenkins,et al.  Eliciting Managers’ Personal Values: An Adaptation of the Laddering Interview Method , 2005 .

[293]  Deborah Estrin,et al.  Rapid Deployment with Confidence: Calibration and Fault Detection in Environmental Sensor Networks , 2006 .

[294]  Moez Krichen,et al.  A Model Based Approach to Combine Load and Functional Tests for Service Oriented Architectures , 2016, VECoS.

[295]  Ewert Bengtsson,et al.  Automated segmentation of free-lying cell nuclei in Pap smears for malignancy-associated change analysis , 2012, 2012 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[296]  Jaime Llorca,et al.  IoT-Cloud Service Optimization in Next Generation Smart Environments , 2016, IEEE Journal on Selected Areas in Communications.

[297]  Daniel A. Menascé,et al.  Autonomic Allocation of Communicating Virtual Machines in Hierarchical Cloud Data Centers , 2014, 2014 International Conference on Cloud and Autonomic Computing.

[298]  Alexandre Termier,et al.  Discovery of Probabilistic Mappings between Taxonomies: Principles and Experiments , 2011, J. Data Semant..

[299]  João Gama,et al.  On evaluating stream learning algorithms , 2012, Machine Learning.

[300]  Philipp Leitner,et al.  Optimized IoT service placement in the fog , 2017, Service Oriented Computing and Applications.

[301]  Clodis Boscarioli,et al.  Avaliação e design de interação de jogos voltados ao aprendizado de crianças surdas , 2012, IHC.

[302]  Lihua Huang,et al.  Leveraging Digital Business Ecosystems for Enterprise Agility: The Tri-Logic Development Strategy of Alibaba.com , 2009, ICIS.

[303]  Cesare Pautasso,et al.  A Framework for Benchmarking BPMN 2.0 Workflow Management Systems , 2015, BPM.

[304]  Ieva Ancveire Fit Gap Analysis Methods for ERP Systems Literature Review , 2018, 2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI).

[305]  Peiquan Jin,et al.  Self-Adaptive Linear Hashing for solid state drives , 2016, 2016 IEEE 32nd International Conference on Data Engineering (ICDE).

[306]  Arun Kejariwal,et al.  Automatic Anomaly Detection in the Cloud Via Statistical Learning , 2017, ArXiv.

[307]  Sepideh Ghanavati,et al.  A Principle-based Goal-oriented Requirements Language (GRL) for Enterprise Architecture , 2014, iStar.

[308]  Alexander V. Smirnov,et al.  Fuzzy Cooperative Games Usage in Smart Contracts for Dynamic Robot Coalition Formation: Approach and Use Case Description , 2019, ICEIS.

[309]  Glenford J. Myers,et al.  Art of Software Testing , 1979 .

[310]  David Mauricio,et al.  A Review of Software Quality Models for the Evaluation of Software Products , 2014, ArXiv.

[311]  Kin K. Leung,et al.  Online Placement of Multi-Component Applications in Edge Computing Environments , 2016, IEEE Access.

[312]  Silvia Mara Abrahão,et al.  A Metamodeling Approach to Estimate Software Size from Requirements Specifications , 2008, 2008 34th Euromicro Conference Software Engineering and Advanced Applications.

[313]  Shikha Agrawal,et al.  Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.

[314]  Sang-Yong Han,et al.  WS-QDL containing static, dynamic, and statistical factors of Web services quality , 2004, Proceedings. IEEE International Conference on Web Services, 2004..

[315]  Marco D. Santambrogio,et al.  HyPPO: Hybrid Performance-Aware Power-Capping Orchestrator , 2018, 2018 IEEE International Conference on Autonomic Computing (ICAC).

[316]  A. W. Roscoe,et al.  Proving security protocols with model checkers by data independence techniques , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).

[317]  Erhard Rahm,et al.  Enriching ontology mappings with semantic relations , 2014, Data Knowl. Eng..

[318]  Xavier Masip-Bruin,et al.  Towards Distributed Service Allocation in Fog-to-Cloud (F2C) Scenarios , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[319]  Ron Adner,et al.  Ecosystem as Structure , 2017 .

[320]  Nick Szabo,et al.  Smart Contracts: Building Blocks for Digital Markets , 2018 .

[321]  Christos V. Verikoukis,et al.  Scalable and Flexible IoT data analytics: when Machine Learning meets SDN and Virtualization , 2018, 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[322]  Olivier Teste,et al.  Pattern-based Method for Anomaly Detection in Sensor Networks , 2019, ICEIS.

[323]  Antonio Alberto de Souza dos Santos,et al.  Model-based decision analysis applied to petroleum field development and management , 2019, Oil & Gas Science and Technology – Revue d’IFP Energies nouvelles.

[324]  Angeliki-Agathi Tsintzira Technical Debt Quantification through Metrics: An Industrial Validation , 2019 .

[325]  R. Kapoor,et al.  Coordinating and competing in ecosystems: How organizational forms shape new technology investments , 2013 .

[326]  William Ruh,et al.  Enterprise Integration: The Essential Guide to Integration Solutions , 2004 .

[327]  T. S. E. Maibaum,et al.  The Epistemology of Validation and Verification Testing , 2005, TestCom.

[328]  Elizabeth F. Churchill Designing data practices , 2016, Interactions.

[329]  Thierry Coupaye,et al.  Combining hardware nodes and software components ordering-based heuristics for optimizing the placement of distributed IoT applications in the fog , 2018, SAC.

[330]  Bogdan Franczyk,et al.  A Personal Analytics Platform for the Internet of Things - Implementing Kappa Architecture with Microservice-based Stream Processing , 2017, ICEIS.

[331]  Lee Momtahan Towards a Small Model Theorem for Data Independent Systems in Alloy , 2005, Electron. Notes Theor. Comput. Sci..

[332]  Francesca Arcelli Fontana,et al.  An Architectural Smells Detection Tool for C and C++ Projects , 2018, 2018 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA).

[333]  Eng Chew,et al.  Exploring the Role of Enterprise Architecture in IS-enabled Ot: An EA Principles Perspective , 2016, 2016 IEEE 20th International Enterprise Distributed Object Computing Workshop (EDOCW).

[334]  Henderik Alex Proper,et al.  The Roles of Principles in Enterprise Architecture , 2010, TEAR.

[335]  Michael J. Muller,et al.  Participatory design , 1993, CACM.

[336]  John A. Zachman,et al.  A Framework for Information Systems Architecture , 1987, IBM Syst. J..

[337]  Bogdan Franczyk,et al.  SEPL: An IoT Platform for Value-added Services in the Energy Domain - Architectural Concept and Software Prototype , 2018, ICEIS.

[338]  Mohamed Jmaiel,et al.  Towards a TTCN-3 Test System for Runtime Testing of Adaptable and Distributed Systems , 2012, ICTSS.

[339]  L. B. Sheremetov,et al.  A model of fuzzy coalition games in problems of configuring open supply networks , 2009 .

[340]  Travis D. Breaux,et al.  An Evaluation of Constituency-Based Hyponymy Extraction from Privacy Policies , 2017, 2017 IEEE 25th International Requirements Engineering Conference (RE).

[341]  Alexander Maedche,et al.  The Evolution of Design Principles Enabling Knowledge Reuse for Projects: An Action Design Research Project , 2015 .

[342]  Celso C. Ribeiro,et al.  Multi-start methods for combinatorial optimization , 2013, Eur. J. Oper. Res..

[343]  Svante Arvedahl Introducing Debtgrep: A Tool for Fighting Technical Debt in Base Station Software , 2018, 2018 IEEE/ACM International Conference on Technical Debt (TechDebt).

[344]  Hazura Zulzalil,et al.  A Case Study to Identify Quality Attributes Relationships for Web- based Applications , 2008 .

[345]  Awais Ahmad,et al.  Real-Time Big Data Stream Processing Using GPU with Spark Over Hadoop Ecosystem , 2018, International Journal of Parallel Programming.

[346]  Jan B. Heide,et al.  The Organization of Regional Clusters , 2009 .

[347]  Ecivaldo de Souza Matos Integração curricular por meio da prática de ensino interdisciplinar em IHC , 2013, WEIHC.

[348]  Mohsen Nickray,et al.  Scheduling of fog networks with optimized knapsack by symbiotic organisms search , 2017, 2017 21st Conference of Open Innovations Association (FRUCT).

[349]  Ryutaro Ichise,et al.  Automated Mapping Generation for Converting Databases into Linked Data , 2010, ISWC Posters&Demos.

[350]  Francisco Martins,et al.  A safe-by-design programming language for wireless sensor networks , 2016, J. Syst. Archit..

[351]  Riccardo Mazza,et al.  Introduction to Information Visualization , 2009 .

[352]  R. Yin The Case Study Crisis: Some Answers , 1981 .

[353]  Marcelo H. Yamaguti,et al.  AGES: An Interdisciplinary Space Based on Projects for Software Engineering Learning , 2017, SBES'17.

[354]  Alberto Sillitti,et al.  Software development processes for mobile systems: Is agile really taking over the business? , 2013, 2013 1st International Workshop on the Engineering of Mobile-Enabled Systems (MOBS).

[355]  Rahul C. Basole,et al.  ecoxight , 2018, ACM Trans. Manag. Inf. Syst..

[356]  Christian Bonnet,et al.  Next-Generation, Data Centric and End-to-End IoT Architecture Based on Microservices , 2018, 2018 IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia).

[357]  J. Euzenat,et al.  Ontology Matching , 2007, Springer Berlin Heidelberg.

[358]  Lon-Mu Liu,et al.  Joint Estimation of Model Parameters and Outlier Effects in Time Series , 1993 .

[359]  C. Richard G. Helps,et al.  Comprehensive design of cyber physical systems , 2012, SIGITE '12.

[360]  S. D. Probert,et al.  Reducing the cost of preventive maintenance (PM) through adopting a proactive reliability-focused culture , 2006 .

[361]  Michael Sherer,et al.  ERP Customization Failure: Institutionalized Accounting Practices, Power Relations and Market Forces , 2007 .

[362]  Thomas Wahl,et al.  Dynamic Symmetry Reduction , 2005, TACAS.

[363]  Anatol Rapoport,et al.  Theories of Coalition Formation , 1998 .

[364]  Jeff Sutherland,et al.  The Scrum Guide , 2012 .

[365]  Tobias Meisen,et al.  Gathering and Combining Semantic Concepts from Multiple Knowledge Bases , 2018, ICEIS.

[366]  Edmund M. Clarke,et al.  Design and Synthesis of Synchronization Skeletons Using Branching Time Temporal Logic , 2008, 25 Years of Model Checking.

[367]  Ilia Bider,et al.  Using Enterprise Modeling in Development of New Business Models , 2019, ICEIS.

[368]  Forrest Shull,et al.  Identification and management of technical debt: A systematic mapping study , 2016, Inf. Softw. Technol..

[369]  Oliver Gassmann,et al.  The Business Model Navigator: 55 Models That Will Revolutionise Your Business , 2014 .

[370]  Lisa F. Seymour,et al.  Managing Enterprise Resource Planning System Customisation Post-Implementation - The Case of an African Petroleum Organisation , 2018, ICEIS.

[371]  Umi Kalsom Yusof,et al.  A FRAMEWORK FOR CLASSIFYING MISFITS BETWEEN ENTERPRISE RESOURCE PLANNING (ERP) SYSTEMS AND BUSINESS STRATEGIES , 2011 .

[372]  Kavita Sheoran,et al.  An Insight of software quality models applied in predicting software quality attributes: A comparative analysis , 2015, 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions).

[373]  Ramon Lawrence,et al.  LittleD: a SQL database for sensor nodes and embedded applications , 2014, SAC.

[374]  Silvana Castano,et al.  Information Integration: The MOMIS Project Demonstration , 2000, VLDB.

[375]  Marcelo Fantinato,et al.  Evaluation of the StrAli-BPM approach: strategic alignment with BPM using agreements in different levels , 2018, Int. J. Bus. Inf. Syst..

[376]  Carsten Binnig,et al.  IncMap: pay as you go matching of relational schemata to OWL ontologies , 2013, OM.

[377]  Khaled Ghédira,et al.  Discussion and review on evolving data streams and concept drift adapting , 2018, Evol. Syst..

[378]  Neil F. Doherty,et al.  Benefits Realization from ERP Systems: the Role of Customization , 2012, ECIS.

[379]  Andrea Marchetti,et al.  XFlow: An XML-Based Document-Centric Workflow , 2005, WISE.

[380]  Kurt Matzler,et al.  Special Issue on Business Model Innovation , 2014 .

[381]  G. Steiner,et al.  A CHINESE PROVERB , 2013 .

[382]  David L. Dill,et al.  Better verification through symmetry , 1996, Formal Methods Syst. Des..

[383]  Maria Cecília Calani Baranauskas,et al.  Playing Cards and Drawing with Patterns - Situated and Participatory Practices for Designing iDTV Applications , 2014, ICEIS.

[384]  Fabio Polticelli,et al.  Experimentation of an automatic resolution method for protein abbreviations in full-text papers , 2011, BCB '11.

[385]  Ian Horrocks,et al.  ColNet: Embedding the Semantics of Web Tables for Column Type Prediction , 2018, AAAI.

[386]  Talel Abdessalem,et al.  Adaptive random forests for evolving data stream classification , 2017, Machine Learning.

[387]  Ilia Bider,et al.  A fractal enterprise model and its application for business development , 2017, Software & Systems Modeling.

[388]  Nathalie Bertrand,et al.  A game approach to determinize timed automata , 2011, Formal Methods Syst. Des..

[389]  Javier López-de-Lacalle,et al.  tsoutliers R Package for Detection of Outliers in Time Series , 2016 .

[390]  David Hovemeyer,et al.  Using Static Analysis to Find Bugs , 2008, IEEE Software.

[391]  Tayana Conte,et al.  Using a Controlled Experiment to Evaluate Usability Inspection Technologies for Improving the Quality of Mobile Web Applications Earlier in their Design , 2014, 2014 Brazilian Symposium on Software Engineering.

[392]  Dimitrios Tzovaras,et al.  Methods and Tools for TD Estimation and Forecasting: A State-of-the-art Survey , 2018, 2018 International Conference on Intelligent Systems (IS).

[393]  Jamie P. Monat,et al.  Industrial sales lead conversion modeling , 2011 .

[394]  Bruno Legeard,et al.  A taxonomy of model‐based testing approaches , 2012, Softw. Test. Verification Reliab..

[395]  Maya Daneva,et al.  An approach to estimation of degree of customization for ERP projects using prioritized requirements , 2016, J. Syst. Softw..

[396]  Srinarayan Sharma,et al.  Efficiency analysis of ERP packages - A customization perspective , 2016, Comput. Ind..

[397]  Kecheng Liu,et al.  Challenges for Human-Data Interaction - A Semiotic Perspective , 2015, HCI.

[398]  Mark von Rosing,et al.  Business Process Model and Notation - BPMN , 2015, The Complete Business Process Handbook, Vol. I.

[399]  Xu Han,et al.  Cost Aware Service Placement and Load Dispatching in Mobile Cloud Systems , 2016, IEEE Transactions on Computers.

[400]  Konstantinos Tserpes,et al.  Employing traditional machine learning algorithms for big data streams analysis: The case of object trajectory prediction , 2016, J. Syst. Softw..

[401]  Nader Sadegh,et al.  A perceptron network for functional identification and control of nonlinear systems , 1993, IEEE Trans. Neural Networks.

[402]  Eduardo Mena,et al.  Some Reflections on the Discovery of Hyponyms between Ontologies , 2019, ICEIS.

[403]  Angel Rodríguez-Liñán,et al.  Collaboration of Robot Swarms with a Relation of Individuals with Prey-Predator Type , 2018 .

[404]  A. Barabasi,et al.  Evolution of the social network of scientific collaborations , 2001, cond-mat/0104162.

[405]  André Vasconcelos,et al.  Business Process Support in the Context of Records Management , 2019, ICEIS.

[406]  Eric Huang,et al.  Key-value store implementations for Arduino microcontrollers , 2015, 2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE).

[407]  Richard T. Watson,et al.  Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..

[408]  Sven-Volker Rehm,et al.  A Systematic Mapping Study on Business Ecosystem Types , 2019, AMCIS.

[409]  Shuping Ran,et al.  A model for web services discovery with QoS , 2003, SECO.

[410]  Pascal Hitzler,et al.  String Similarity Metrics for Ontology Alignment , 2013, SEMWEB.

[411]  Martins Netto,et al.  Heurísticas e guidelines para apresentação de hiperdocumentos multimídia na Web , 2002 .

[412]  Silvia Mara Abrahão,et al.  A model-driven measurement procedure for sizing web applications: design, automation and validation , 2007, MODELS'07.

[413]  Eric Schenk,et al.  Crowdsourcing and the Evolution of a Business Ecosystem , 2015 .

[414]  Francesca Arcelli Fontana,et al.  Arcan: A Tool for Architectural Smells Detection , 2017, 2017 IEEE International Conference on Software Architecture Workshops (ICSAW).

[415]  Christoph Treude,et al.  Tracy: A Business-Driven Technical Debt Prioritization Framework , 2019, 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME).

[416]  Luís Ferreira Pires,et al.  An approach to the decomposition of business processes for execution in the Cloud , 2014, 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA).

[417]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[418]  Jinwu Gao,et al.  Coalitional game with fuzzy payoffs and credibilistic core , 2010, Soft Comput..

[419]  Mohamed Jmaiel,et al.  Distributed and Resource-Aware Load Testing of WS-BPEL Compositions , 2018, ICEIS.

[420]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[421]  Eduardo Mena,et al.  Generic Rules for the Discovery of Subsumption Relationships Based on Ontological Contexts , 2015, 2015 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT).

[422]  Yarden Katz,et al.  Pellet: A practical OWL-DL reasoner , 2007, J. Web Semant..

[423]  L. B. Sheremetov,et al.  Models of coalition formation among cooperative agents: The current state and prospects of research , 2012, Scientific and Technical Information Processing.

[424]  Claude Godart,et al.  A Flexible Approach for Automatic Process Decentralization Using Dependency Tables , 2009, 2009 IEEE International Conference on Web Services.

[425]  Stavros Tripakis,et al.  Conformance testing for real-time systems , 2004, SPIN.

[426]  Rajkumar Buyya,et al.  iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments , 2016, Softw. Pract. Exp..

[427]  Leslie Pérez Cáceres,et al.  The irace package: Iterated racing for automatic algorithm configuration , 2016 .

[428]  Francisco Martins,et al.  Using BPMN to model Internet of Things behavior within business process , 2022, International Journal of Information Systems and Project Management.

[429]  Herbert Van de Sompel,et al.  The open archives initiative: building a low-barrier interoperability framework , 2001, JCDL '01.

[430]  Ben Shneiderman,et al.  The eyes have it: a task by data type taxonomy for information visualizations , 1996, Proceedings 1996 IEEE Symposium on Visual Languages.

[431]  Joseph Sifakis,et al.  Modeling Urgency in Timed Systems , 1997, COMPOS.

[432]  L. Amaral,et al.  The role of mentorship in protégé performance , 2010, Nature.

[433]  Ian Horrocks,et al.  Learning Semantic Annotations for Tabular Data , 2019, IJCAI.

[434]  Florin Pop,et al.  Deep learning model for home automation and energy reduction in a smart home environment platform , 2018, Neural Computing and Applications.

[435]  Birgit Vogel-Heuser,et al.  Technical Debt indication in PLC Code for automated Production Systems: Introducing a Domain Specific Static Code Analysis Tool , 2018 .

[436]  Kurt Rothermel,et al.  MigCEP: operator migration for mobility driven distributed complex event processing , 2013, DEBS.

[437]  Mouna Kamel,et al.  Hypernym Relation Extraction for Establishing Subsumptions: Preliminary Results on Matching Foundational Ontologies , 2019, OM@ISWC.

[438]  Carme Quer,et al.  Towards a Quality Model for the Selection of ERP Systems , 2003, Component-Based Software Quality.

[439]  Gary W. Dickson,et al.  A Principles-Based Enterprise Architecture: Lessons from Texaco and Star Enterprise , 1990, MIS Q..

[440]  Eliane Zambon Victorelli,et al.  Design Process for Human-Data Interaction: Combining Guidelines with Semio-participatory Techniques , 2019, ICEIS.

[441]  O. Dedehayir,et al.  Business ecosystem evolution and strategic considerations: A literature review , 2012, 2012 18th International ICE Conference on Engineering, Technology and Innovation.

[442]  J. F. Moore,et al.  Predators and prey: a new ecology of competition. , 1993, Harvard business review.

[443]  George A. Vouros,et al.  CSR: Discovering Subsumption Relations for the Alignment of Ontologies , 2008, ESWC.

[444]  Birte Glimm,et al.  Konclude: System description , 2014, J. Web Semant..

[445]  Matthias Klusch,et al.  Dynamic Coalition Formation among Rational Agents , 2002, IEEE Intell. Syst..

[446]  Hans-Peter Kriegel,et al.  LOF: identifying density-based local outliers , 2000, SIGMOD '00.

[447]  Philippe Bonnet,et al.  Towards Sensor Database Systems , 2001, Mobile Data Management.

[448]  Craig A. Knoblock,et al.  Assigning Semantic Labels to Data Sources , 2015, ESWC.

[449]  Mohamed Jmaiel,et al.  Using Knapsack Problem Model to Design a Resource Aware Test Architecture for Adaptable and Distributed Systems , 2012, ICTSS.

[450]  Addy Osmani Learning JavaScript Design Patterns - a JavaScript and jQuery Developer's Guide , 2012 .

[451]  Ashwin B. Tomar,et al.  A SYSTEMATIC STUDY OF SOFTWARE QUALITY MODELS , 2011 .

[452]  Jesús P. Mena-Chalco,et al.  Identificação do grafo de genealogia acadêmica de pesquisadores: Uma abordagem baseada na Plataforma Lattes , 2017, SBBD.

[453]  M. Rizwan Jameel Qureshi,et al.  Agile software development methodology for medium and large projects , 2012, IET Softw..

[454]  James Martin,et al.  Rapid Application Development , 1991 .

[455]  Kouroush Jenab,et al.  Evaluating ERP implementation choices on the basis of customisation using fuzzy AHP , 2012 .

[456]  Frank Harmsen,et al.  Measuring Architecture Principles and Their Sets in Practice: Creating an Architecture Principle Measurement Instrument Challenged in a Case Study at the Dutch Tax Agency , 2019, ICEIS.

[457]  Shamimul Qamar,et al.  The 51 V's Of Big Data: Survey, Technologies, Characteristics, Opportunities, Issues and Challenges , 2019, COINS.

[458]  Josep Lluís Cano Giner,et al.  Technology Ecosystem Governance , 2013, Organ. Sci..

[459]  Ron Adner,et al.  Value Creation in Innovation Ecosystems: How the Structure of Technological Interdependence Affects Firm Performance in New Technology Generations , 2009 .

[460]  Liam O'Brien,et al.  Quality Attributes and Service-Oriented Architectures , 2005 .

[461]  Per-Åke Larson,et al.  Linear hashing with overflow-handling by linear probing , 1985, TODS.

[462]  Anand Sharma,et al.  Physical Access System Security of IoT Devices using Machine Learning Techniques , 2019 .

[463]  Serge Demeyer,et al.  Migrating towards microservices: migration and architecture smells , 2018, IWoR@ASE.

[464]  Eman S. Nasr,et al.  Benefits and challenges of cloud ERP systems – A systematic literature review , 2016 .

[465]  Catherine Faron-Zucker,et al.  Possibilistic testing of OWL axioms against RDF data , 2017, Int. J. Approx. Reason..

[466]  Song Guo,et al.  Joint Optimization of Task Scheduling and Image Placement in Fog Computing Supported Software-Defined Embedded System , 2016, IEEE Transactions on Computers.

[467]  Zhi-Hua Zhou,et al.  Classification Under Streaming Emerging New Classes: A Solution Using Completely-Random Trees , 2016, IEEE Transactions on Knowledge and Data Engineering.

[468]  S S Sreevidya,et al.  A Survey on Outlier Detection Methods , 2014 .

[469]  João Gama,et al.  Ensemble learning for data stream analysis: A survey , 2017, Inf. Fusion.

[470]  Lotfi A. Zadeh,et al.  Similarity relations and fuzzy orderings , 1971, Inf. Sci..

[471]  Joseph Sifakis,et al.  Specification and verification of concurrent systems in CESAR , 1982, Symposium on Programming.

[472]  Schahram Dustdar,et al.  Optimization of Complex Elastic Processes , 2016, IEEE Transactions on Services Computing.

[473]  Jan Bosch,et al.  A Systematic Literature Review and a Unified Model of ATD , 2016, 2016 42th Euromicro Conference on Software Engineering and Advanced Applications (SEAA).

[474]  Per-Åke Larson,et al.  Performance analysis of linear hashing with partial expansions , 1982, TODS.

[475]  Hanspeter Pfister,et al.  Commercial Visual Analytics Systems–Advances in the Big Data Analytics Field , 2019, IEEE Transactions on Visualization and Computer Graphics.

[476]  Yuan Yao,et al.  Online anomaly detection for sensor systems: A simple and efficient approach , 2010, Perform. Evaluation.

[477]  Åsa Lindström,et al.  On the Syntax and Semantics of Architectural Principles , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[478]  Jukka Huhtamäki,et al.  Understanding Business Ecosystem Dynamics: A Data-Driven Approach , 2015, TMIS.

[479]  Muhammad Younas,et al.  Research challenges of big data , 2019, Service Oriented Computing and Applications.

[480]  Allwin Stephen,et al.  Nominated Texture Based Cervical Cancer Classification , 2015, Comput. Math. Methods Medicine.

[481]  Alon Y. Halevy,et al.  Discovering Subsumption Relationships for Web-Based Ontologies , 2015, WebDB.

[482]  H. Hosam,et al.  Planning Coalition Formation under Uncertainty: Auction Approach , 2006, 2006 2nd International Conference on Information & Communication Technologies.

[483]  Rahul C. Basole,et al.  Visual analytics for supply network management: System design and evaluation , 2016, Decis. Support Syst..

[484]  K. Eisenhardt,et al.  Politics of Strategic Decision Making in High-Velocity Environments: Toward a Midrange Theory , 1988 .

[485]  Martin Op't Land,et al.  Impact of Principles on Enterprise Engineering , 2007, ECIS.

[486]  Ming-Chien Hung,et al.  Competition and Challenge on Adopting Cloud ERP , 2014 .

[487]  Niklas Elmqvist,et al.  Fluid interaction for information visualization , 2011, Inf. Vis..

[488]  Aaldert Hofman,et al.  The Integrated Architecture Framework Explained: Why, What, How , 2010 .

[489]  Christoph Schroth,et al.  The Internet of Things in an Enterprise Context , 2009, FIS.

[490]  Rajendra M. Sonar,et al.  Evaluating and selecting software packages: A review , 2009, Inf. Softw. Technol..

[491]  Tayana Conte,et al.  Improving a Usability Inspection Technique Based on Quantitative and Qualitative Analysis , 2014, 2014 Brazilian Symposium on Software Engineering.

[492]  Jan A. P. Hoogervorst,et al.  Enterprise Architecture: Enabling Integration, Agility And Change , 2004, Int. J. Cooperative Inf. Syst..

[493]  Mohamed Jmaiel,et al.  Automated Significant Load Testing for WS-BPEL Compositions , 2013, 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops.

[494]  Yacine Challal,et al.  Energy efficiency in wireless sensor networks: A top-down survey , 2014, Comput. Networks.

[495]  Rajaa Saidi,et al.  The Use of Ubiquitous Computing for Business Process Improvement , 2016, IEEE Transactions on Services Computing.

[496]  Markku Oivo,et al.  Analyzing the concept of technical debt in the context of agile software development: A systematic literature review , 2017, Inf. Softw. Technol..

[497]  Jan Bosch,et al.  Managing architectural technical debt: A unified model and systematic literature review , 2018, J. Syst. Softw..

[498]  Hideo Tanaka,et al.  FUZZY APPROXIMATIONS WITH NON-SYMMETRIC FUZZY PARAMETERS IN FUZZY REGRESSION ANALYSIS , 1999 .

[499]  Sepideh Ghanavati,et al.  Formalizing and Modeling Enterprise Architecture (EA) Principles with Goal-Oriented Requirements Language (GRL) , 2016, CAiSE.

[500]  Amrit Tiwana,et al.  Platform Synergy: Architectural Origins and Competitive Consequences , 2018, Inf. Syst. Res..

[501]  Eduardo Mena,et al.  Semantic reasoning on mobile devices: Do Androids dream of efficient reasoners? , 2015, J. Web Semant..

[502]  Saul J. Berman,et al.  Three ways to successfully innovate your business model , 2007 .

[503]  Alun Preece,et al.  A block chain based architecture for asset management in coalition operations , 2017, Defense + Security.

[504]  Alan J. Hu,et al.  Reducing BDD Size by Exploiting Functional Dependencies , 1993, 30th ACM/IEEE Design Automation Conference.

[505]  Xiaolei Li,et al.  Deep-level quality management based on big data analytics with case study , 2017, 2017 Chinese Automation Congress (CAC).

[506]  Samuli Kortelainen,et al.  Taking stock of empirical research on business ecosystems: a literature review , 2017 .

[507]  Frank Kargl,et al.  Sequence-aware Intrusion Detection in Industrial Control Systems , 2015, CPSS@ASIACSS.

[508]  Claude Godart,et al.  Partitioning and Cloud Deployment of Composite Web Services under Security Constraints , 2013, 2013 IEEE International Conference on Cloud Engineering (IC2E).

[509]  Marcelo Fantinato,et al.  A Contribution to Organizational and Operational Strategic Alignment: Incorporating Business Level Agreements into Business Process Modeling , 2013, 2013 IEEE International Conference on Services Computing.

[510]  Yan Wang,et al.  Struggling towards virtuous coevolution: institutional and strategic works of Alibaba in building the Taobao e-commerce ecosystem , 2018 .

[511]  Jen-Her Wu,et al.  Empirically Testing User Characteristics and Fitness Factors in Enterprise Resource Planning Success , 2005, Int. J. Hum. Comput. Interact..

[512]  Antonio Brogi,et al.  QoS-Aware Deployment of IoT Applications Through the Fog , 2017, IEEE Internet of Things Journal.

[513]  Radu Iosif,et al.  Symmetry Reduction Criteria for Software Model Checking , 2002, SPIN.

[514]  Florian Matthes,et al.  A Conceptual Framework for Enterprise Architecture Design , 2010, TEAR.

[515]  Eduardo Mena,et al.  Evaluating Some Heuristics to Find Hyponyms Between Ontologies , 2019, ICEIS.

[516]  Gustaf Juell-Skielse,et al.  Cloud enterprise resource planning adoption: Motives a barriers , 2012 .

[517]  Alain Abran,et al.  Guide to the Software Engineering Body of Knowledge : 2004 Version , 2005 .

[518]  Simone Paolo Ponzetto,et al.  BabelNet: The automatic construction, evaluation and application of a wide-coverage multilingual semantic network , 2012, Artif. Intell..

[519]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[520]  Katri Valkokari,et al.  Business , Innovation , and Knowledge Ecosystems : How They Differ and How to Survive and Thrive within Them , 2022 .

[521]  Philipp Leitner,et al.  Resource Provisioning for IoT Services in the Fog , 2016, 2016 IEEE 9th International Conference on Service-Oriented Computing and Applications (SOCA).

[522]  Hajo A. Reijers,et al.  Towards a Conceptual Framework for Decomposing Non-functional Requirements of Business Process into Quality of Service Attributes , 2019, ICEIS.

[523]  Nick Craswell Mean Reciprocal Rank , 2009, Encyclopedia of Database Systems.

[524]  Alexander A. Grusho,et al.  Information security architecture synthesis in distributed information computation systems , 2017, Automatic Control and Computer Sciences.

[525]  Francisco Herrera,et al.  A survey on data preprocessing for data stream mining: Current status and future directions , 2017, Neurocomputing.

[526]  Junhong Wang,et al.  Dynamic extreme learning machine for data stream classification , 2017, Neurocomputing.

[527]  Saso Dzeroski,et al.  Multi-label classification via multi-target regression on data streams , 2016, Machine Learning.

[528]  Mariam Lahami,et al.  Towards a Runtime Standard-based Testing Framework for Dynamic Distributed Information Systems , 2019, ICEIS.

[529]  Hong-Gee Kim,et al.  Aligning ontologies with subsumption and equivalence relations in Linked Data , 2015, Knowl. Based Syst..

[530]  Salil S. Kanhere,et al.  Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[531]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[532]  Alexander Chatzigeorgiou,et al.  JDeodorant: Identification and Removal of Type-Checking Bad Smells , 2008, 2008 12th European Conference on Software Maintenance and Reengineering.

[533]  Wei Zhao,et al.  Migration Modeling and Learning Algorithms for Containers in Fog Computing , 2019, IEEE Transactions on Services Computing.

[534]  Karanjit Singh,et al.  Nearest Neighbour Based Outlier Detection Techniques , 2012 .

[535]  Hajo A. Reijers,et al.  Monitoring of Non-functional Requirements of Business Processes based on Quality of Service Attributes of Web Services , 2019, ICEIS.

[536]  Anne H. H. Ngu,et al.  QoS computation and policing in dynamic web service selection , 2004, WWW Alt. '04.

[537]  Tim Finin,et al.  Exploiting a Web of Semantic Data for Interpreting Tables , 2010 .

[538]  Ramon Lawrence,et al.  TEFS: A flash file system for use on memory constrained devices , 2016, 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[539]  Francesco Cafaro,et al.  Using embodied allegories to design gesture suites for human-data interaction , 2012, UbiComp.

[540]  Hamid Reza Arkian,et al.  MIST: Fog-based data analytics scheme with cost-efficient resource provisioning for IoT crowdsensing applications , 2017, J. Netw. Comput. Appl..

[541]  Stavros Tripakis,et al.  State-Identification Problems for Finite-State Transducers , 2006, FATES/RV.

[542]  Nada Lavrac,et al.  Stream-based active learning for sentiment analysis in the financial domain , 2014, Inf. Sci..

[543]  Witold Abramowicz,et al.  Duality in Web Services Reliability , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).

[544]  Bartley D. Richardson,et al.  Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic , 2018, ArXiv.

[545]  Mike P. Papazoglou,et al.  A Reference Architecture and Knowledge-Based Structures for Smart Manufacturing Networks , 2015, IEEE Software.

[546]  Roberto Lotufo,et al.  Nuclei Detection Using Deep Learning , 2017 .

[547]  Tayana Conte,et al.  Using an empirical study to evaluate the feasibility of a new usability inspection technique for paper based prototypes of web applications , 2012, 2012 26th Brazilian Symposium on Software Engineering.

[548]  Tobias Meisen,et al.  Enhancing Knowledge Graphs with Data Representatives , 2019, ICEIS.