Research Challenges in Information Science: 14th International Conference, RCIS 2020, Limassol, Cyprus, September 23–25, 2020, Proceedings
暂无分享,去创建一个
Pericles Loucopoulos | Jelena Zdravkovic | Fabiano Dalpiaz | Wil M.P. van der Aalst | Wil van der Aalst | F. Dalpiaz | J. Zdravkovic | P. Loucopoulos
[1] Joonas Tuhkuri,et al. ETLAnow: A Model for Forecasting with Big Data – Forecasting Unemployment with Google Searches in Europe , 2016 .
[2] Thorsten Brants,et al. One billion word benchmark for measuring progress in statistical language modeling , 2013, INTERSPEECH.
[3] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[4] J. Euzenat,et al. Ontology Matching , 2007, Springer Berlin Heidelberg.
[5] Paul Johannesson,et al. Is the Public Motivated to Engage in Open Data Innovation? , 2014, EGOV.
[6] van der Wmp Wil Aalst,et al. Business process simulation : how to get it right? , 2008 .
[7] Frank Piessens,et al. All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS , 2015, USENIX Annual Technical Conference.
[8] Adriana Marotta,et al. Data Quality Evaluation in Document Oriented Data Stores , 2018, ER Workshops.
[9] Prabhakar M. Dixit,et al. Interactive process mining , 2019 .
[10] Bryan Pfaffenberger,et al. The rhetoric of dread: Fear, uncertainty, and doubt (FUD) in information technology marketing , 2000 .
[11] Asunción Gómez-Pérez,et al. METHONTOLOGY: From Ontological Art Towards Ontological Engineering , 1997, AAAI 1997.
[12] Touradj Ebrahimi,et al. A Reliable and Reversible Image Privacy Protection Based on False Colors , 2018, IEEE Transactions on Multimedia.
[13] Hal Daumé,et al. Deep Unordered Composition Rivals Syntactic Methods for Text Classification , 2015, ACL.
[14] Robert Feldt,et al. Automated System Testing Using Visual GUI Testing Tools: A Comparative Study in Industry , 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation.
[15] Max Mühlhäuser,et al. Analyzing business process anomalies using autoencoders , 2018, Machine Learning.
[16] Xavier Franch,et al. Natural Language Processing for Requirements Engineering: The Best Is Yet to Come , 2018, IEEE Software.
[17] Connie R. Wanberg,et al. The individual experience of unemployment. , 2012, Annual review of psychology.
[18] Helena Holmström Olsson,et al. JAutomate: A Tool for System- and Acceptance-test Automation , 2013, 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation.
[19] Deborah Lee,et al. I Trust It, but I Don’t Know Why , 2013, Hum. Factors.
[20] Andreas Kerren,et al. Text visualization techniques: Taxonomy, visual survey, and community insights , 2015, 2015 IEEE Pacific Visualization Symposium (PacificVis).
[21] WebsterJane,et al. Analyzing the past to prepare for the future , 2002 .
[22] Steven L. Alter. The concept of ‘IT artifact’ has outlived its usefulness and should be retired now , 2015, Inf. Syst. J..
[23] José Matías Rivero,et al. Challenges for the Adoption of Model-Driven Web Engineering Approaches in Industry , 2017, J. Web Eng..
[24] Shirley Gregor,et al. The Anatomy of a Design Theory , 2007, J. Assoc. Inf. Syst..
[25] Arto Vihavainen,et al. Learning agile software engineering practices using coding dojo , 2013, SIGITE Conference.
[26] Gabriele Bavota,et al. Release Planning of Mobile Apps Based on User Reviews , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).
[27] Marcela Genero,et al. A systematic identification of consistency rules for UML diagrams , 2018, J. Syst. Softw..
[28] Slobodan Vucetic,et al. Travel Speed Forecasting by Means of Continuous Conditional Random Fields , 2011 .
[29] Wil M. P. van der Aalst. Business Process Simulation Revisited , 2010, EOMAS.
[30] Christoph Meinel,et al. Punctuation Prediction for Unsegmented Transcript Based on Word Vector , 2016, LREC.
[31] James P. Peerenboom,et al. Identifying, understanding, and analyzing critical infrastructure interdependencies , 2001 .
[32] Qi Feng,et al. A business process simulation method supporting resource evolution , 2014, ICSSP 2014.
[33] Johnny Saldaña,et al. The Coding Manual for Qualitative Researchers , 2009 .
[34] Marc Cuggia,et al. The French Health Data Hub and the German Medical Informatics Initiatives: Two National Projects to Promote Data Sharing in Healthcare , 2019, Yearbook of Medical Informatics.
[35] Josivania Silva Farias,et al. The Motivation to Participate in Citizen-Sourcing and Hackathons in the Public Sector , 2018, BAR - Brazilian Administration Review.
[36] Tanja E. J. Vos,et al. TESTAR: Tool Support for Test Automation at the User Interface Level , 2015, Int. J. Inf. Syst. Model. Des..
[37] Jérôme Euzenat,et al. An API for Ontology Alignment , 2004, SEMWEB.
[38] Monique Snoeck,et al. CaMeLOT: An educational framework for conceptual data modelling , 2019, Inf. Softw. Technol..
[39] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[40] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[41] S. Pfleeger,et al. From Weakest Link to Security Hero: Transforming Staff Security Behavior , 2014 .
[42] Jeffrey D. Ullman,et al. Implementing data cubes efficiently , 1996, SIGMOD '96.
[43] Judith Masthoff,et al. Kindness is Contagious: Exploring Engagement in a Gamified Persuasive Intervention for Wellbeing , 2017, PGW@CHI PLAY.
[44] John Mylopoulos,et al. A Core Ontology for Privacy Requirements Engineering , 2018, ArXiv.
[45] Wil M. P. van der Aalst,et al. On the Representational Bias in Process Mining , 2011, 2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[46] Ilia Bider. In Search for a Good Theory: Commuting between Research and Practice in Business Process Domain , 2011, BMMDS/EMMSAD.
[47] Matteo Golfarelli,et al. Approximate OLAP of document-oriented databases: A variety-aware approach , 2019, Inf. Syst..
[48] Jonathan I. Maletic,et al. Journal of Software Maintenance and Evolution: Research and Practice Survey a Survey and Taxonomy of Approaches for Mining Software Repositories in the Context of Software Evolution , 2022 .
[49] Max Jacobson,et al. A Pattern Language: Towns, Buildings, Construction , 1981 .
[50] Udo Kelter,et al. Understanding model evolution through semantically lifting model differences with SiLift , 2012, 2012 28th IEEE International Conference on Software Maintenance (ICSM).
[51] Tanja E. J. Vos,et al. Industrial Scaled Automated Structural Testing with the Evolutionary Testing Tool , 2010, 2010 Third International Conference on Software Testing, Verification and Validation.
[52] Bernd Brügge,et al. Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring , 2014, 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE).
[53] Ekkart Kindler,et al. Incremental Workflow Mining Based on Document Versioning Information , 2005, ISPW.
[54] Peter Bell,et al. Sequence-to-sequence models for punctuated transcription combining lexical and acoustic features , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[55] John Mylopoulos,et al. GaiusT: supporting the extraction of rights and obligations for regulatory compliance , 2013, Requirements Engineering.
[56] Jacques Derrida,et al. L'écriture Et La Différence , 1967 .
[57] Jens Bürger. Recovering Security in Model-Based Software Engineering by Context-Driven Co-Evolution , 2019 .
[58] Yang Song,et al. Learning Fine-Grained Image Similarity with Deep Ranking , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[59] Gregg Rothermel,et al. Comparing model-based and dynamic event-extraction based GUI testing techniques: An empirical study , 2014, J. Syst. Softw..
[60] Anna Goldenberg,et al. What Clinicians Want: Contextualizing Explainable Machine Learning for Clinical End Use , 2019, MLHC.
[61] Camille Salinesi,et al. A Security Ontology for Security Requirements Elicitation , 2015, ESSoS.
[62] R. F. Hull,et al. Zen in the Art of Archery , 1948 .
[63] Wil M. P. van der Aalst,et al. Incremental Discovery of Hierarchical Process Models , 2020, RCIS.
[64] Mark Giancaspro,et al. Is a 'smart contract' really a smart idea? Insights from a legal perspective , 2017, Comput. Law Secur. Rev..
[65] Irina O. Rajewsky. Intermediality, Intertextuality, and Remediation: A Literary Perspective on Intermediality , 2005 .
[66] Kohei Honda,et al. An Interaction-based Language and its Typing System , 1994, PARLE.
[67] Eddie Hughes. Unlocking Blockchain: Embracing New Technologies to Drive Efficiency and Empower the Citizen , 2018, The Journal of the British Blockchain Association.
[68] King Sing Cheung,et al. Consistency Analysis on Lifecycle Model and Interaction Model , 1998 .
[69] Rachida Dssouli,et al. Big Data Pre-processing: A Quality Framework , 2015, 2015 IEEE International Congress on Big Data.
[70] Or Biran,et al. Explanation and Justification in Machine Learning : A Survey Or , 2017 .
[71] Nyi Nyi Htun,et al. Effects of personal characteristics in control-oriented user interfaces for music recommender systems , 2019, User Modeling and User-Adapted Interaction.
[72] Felipe Caro,et al. Zara Uses Operations Research to Reengineer Its Global Distribution Process , 2010, Interfaces.
[73] Tim Miller,et al. Explanation in Artificial Intelligence: Insights from the Social Sciences , 2017, Artif. Intell..
[74] Hans K. Hvide. Tournament Rewards and Risk Taking , 1999, Journal of Labor Economics.
[75] Claes Wohlin,et al. Experimentation in Software Engineering , 2000, The Kluwer International Series in Software Engineering.
[76] C. Lejeune. Montrer, calculer, explorer, analyser. Ce que l'informatique fait (faire) à l'analyse qualitative , 2010 .
[77] Tariq M. King,et al. Using WReSTT in SE courses: an empirical study , 2012, SIGCSE '12.
[78] Quoc V. Le,et al. QANet: Combining Local Convolution with Global Self-Attention for Reading Comprehension , 2018, ICLR.
[79] Mathias Weske,et al. Disambiguation of DMN Decision Tables , 2018, BIS.
[80] Robert Feldt,et al. Visual GUI testing in practice: challenges, problemsand limitations , 2015, Empirical Software Engineering.
[81] Dimitrios Kouzapas,et al. Privacy by typing in the π-calculus , 2017, Log. Methods Comput. Sci..
[82] Ilia Bider,et al. Structural Coupling, Strategy and Fractal Enterprise Modeling , 2020, RCIS.
[83] Athanasios Kehagias,et al. A note on the refinement of ontologies , 2000, Int. J. Intell. Syst..
[84] Pankesh Patel,et al. Enabling high-level application development for the Internet of Things , 2015, J. Syst. Softw..
[85] Jagruti D. Parmar,et al. Anomaly Detection in Data Mining: A Review , 2017 .
[86] Frank Eliassen,et al. A resource oriented integration architecture for the Internet of Things: A business process perspective , 2015, Pervasive Mob. Comput..
[87] David W. Embley,et al. Big Data - Conceptual Modeling to the Rescue , 2013, ER.
[88] Slim Abdennadher,et al. Character Computing: Computer Science meets Psychology , 2018, MUM.
[89] Mohsen Guizani,et al. BPDS: A Blockchain Based Privacy-Preserving Data Sharing for Electronic Medical Records , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[90] Keng Siau,et al. Can UML Be Simplified? Practitioner Use of UML in Separate Domains , 2007, EMMSAD.
[91] Pável Calado,et al. RSL-IL4Privacy: a domain-specific language for the rigorous specification of privacy policies , 2018, Requirements Engineering.
[92] Ying Liu,et al. Organizational Control, Incentive Contracts, and Knowledge Transfer in Offshore Business Process Outsourcing , 2015, Inf. Syst. Res..
[93] Sebastian G. Elbaum,et al. Bug Hunt: Making Early Software Testing Lessons Engaging and Affordable , 2007, 29th International Conference on Software Engineering (ICSE'07).
[94] Christoph Trattner,et al. Towards Health (Aware) Recommender Systems , 2017, DH.
[95] M. Goldstein,et al. Health information privacy and health information technology in the US correctional setting. , 2014, American journal of public health.
[96] Iryna Gurevych,et al. Concatenated Power Mean Word Embeddings as Universal Cross-Lingual Sentence Representations , 2018, 1803.01400.
[97] Jens Bürger,et al. Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models , 2013, FOSAD.
[98] Christian Catalini,et al. Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability , 2018, Computational and structural biotechnology journal.
[99] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[100] Nobuko Yoshida,et al. Multiparty asynchronous session types , 2008, POPL '08.
[101] Assaf Marron,et al. A Context-Based Behavioral Language for IoT , 2018, MoDELS.
[102] Rommel N. Carvalho,et al. Deep Learning Anomaly Detection as Support Fraud Investigation in Brazilian Exports and Anti-Money Laundering , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).
[103] Fred Popowich,et al. Visualizing RNN States with Predictive Semantic Encodings , 2019, 2019 IEEE Visualization Conference (VIS).
[104] Ellen Francine Barbosa,et al. Educational games: A contribution to software testing education , 2017, 2017 IEEE Frontiers in Education Conference (FIE).
[105] T. J. Teorey,et al. A logical design methodology for relational databases using the extended entity-relationship model , 1986, CSUR.
[106] Norman M. Sadeh,et al. PrivOnto: A semantic framework for the analysis of privacy policies , 2017 .
[107] Rita Asplund. Unemployment among Finnish Manufacturing Workers. Who Gets Unemployed and from Where , 2000 .
[108] Vivian W. Mott. Knowledge comes from practice: Reflective theory building in practice , 1996 .
[109] Beatriz Marín,et al. Learning Conceptual Modeling Design Through the Classutopia Serious Game , 2018, Int. J. Softw. Eng. Knowl. Eng..
[110] Vasco Thudichum Vasconcelos,et al. Language Primitives and Type Discipline for Structured Communication-Based Programming Revisited: Two Systems for Higher-Order Session Communication , 1998, SecReT@ICALP.
[111] Alia El Bolock,et al. Character Computing , 2020 .
[112] Olegas Vasilecas,et al. An approach for allocation of shared resources in the rule-based business process simulation , 2016, CompSysTech.
[113] Michael I. Jordan,et al. Distance Metric Learning with Application to Clustering with Side-Information , 2002, NIPS.
[114] Xiang 'Anthony' Chen,et al. Outlining the Design Space of Explainable Intelligent Systems for Medical Diagnosis , 2019, IUI Workshops.
[115] Robert Shimer,et al. Reassessing the Ins and Outs of Unemployment , 2007 .
[116] Beatriz Marín,et al. Testing of model-driven development applications , 2017, Software Quality Journal.
[117] Kin K. Leung,et al. A Survey of Incentive Mechanisms for Participatory Sensing , 2015, IEEE Communications Surveys & Tutorials.
[118] Maria Pantoja,et al. Introduction to Deep Learning , 2018, Deep Learning.
[119] John Mylopoulos,et al. Ontologies for Privacy Requirements Engineering: A Systematic Literature Review , 2016, ArXiv.
[120] Themis Palpanas,et al. Model-Driven Dashboards for Business Performance Reporting , 2006, 2006 10th IEEE International Enterprise Distributed Object Computing Conference (EDOC'06).
[121] Giancarlo Guizzardi,et al. Ontology, Ontologies and the “I” of FAIR , 2020, Data Intelligence.
[122] Rebecca Smith,et al. An Automated System for Interactively Learning Software Testing , 2017, ITiCSE.
[123] Sunghyun Cho,et al. A Survey of Scalability Solutions on Blockchain , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).
[124] Kurt Sandkuhl,et al. Architecting Service-Dominant Digital Products , 2018, ENASE.
[125] Erik Wilde,et al. From the Internet of Things to the Web of Things: Resource-oriented Architecture and Best Practices , 2011, Architecting the Internet of Things.
[126] Quoc V. Le,et al. Distributed Representations of Sentences and Documents , 2014, ICML.
[127] D. Elbourne,et al. Systematic review of the Hawthorne effect: New concepts are needed to study research participation effects☆ , 2014, Journal of clinical epidemiology.
[128] Carl Anderson. Creating a Data-Driven Organization , 2015 .
[129] Stephen H. Edwards,et al. Responses to adaptive feedback for software testing , 2014, ITiCSE '14.
[130] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[131] Ségolène Aymé,et al. Empowerment of patients: lessons from the rare diseases community , 2008, The Lancet.
[132] Franck Dernoncourt,et al. PubMed 200k RCT: a Dataset for Sequential Sentence Classification in Medical Abstracts , 2017, IJCNLP.
[133] Ilia Bider,et al. A fractal enterprise model and its application for business development , 2017, Software & Systems Modeling.
[134] John Mylopoulos,et al. Nòmos 3: Reasoning about regulatory compliance of requirements , 2014, 2014 IEEE 22nd International Requirements Engineering Conference (RE).
[135] Mehrdad Sabetzadeh,et al. Using Models to Enable Compliance Checking Against the GDPR: An Experience Report , 2019, 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems (MODELS).
[136] Holger Schwenk,et al. Supervised Learning of Universal Sentence Representations from Natural Language Inference Data , 2017, EMNLP.
[137] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[138] Christian S. Perone,et al. Evaluation of sentence embeddings in downstream and linguistic probing tasks , 2018, ArXiv.
[139] Beatriz Marín,et al. A Methodological Framework for Evaluating Software Testing Techniques and Tools , 2012, 2012 12th International Conference on Quality Software.
[140] Peyman Oreizy,et al. An architecture-based approach to self-adaptive software , 1999, IEEE Intell. Syst..
[141] Alberto Rodrigues da Silva,et al. RSLingo4Privacy Studio - A Tool to Improve the Specification and Analysis of Privacy Policies , 2017, ICEIS.
[142] Richard J. Cook,et al. The Statistical Analysis of Recurrent Events , 2007 .
[143] Yong Yu,et al. Long Text Generation via Adversarial Training with Leaked Information , 2017, AAAI.
[144] Mieke Boon,et al. Models as Epistemic Tools in Engineering Sciences , 2009 .
[145] Juan Carlos Augusto,et al. Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle , 2017, 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA).
[146] Giancarlo Guizzardi,et al. Extending the Foundations of Ontology-Based Conceptual Modeling with a Multi-level Theory , 2015, ER.
[147] Mihai Lupu,et al. PrioPrivacy: A Local Recoding K-Anonymity Tool for Prioritised Quasi-Identifiers , 2019, WI.
[148] Chao Chen,et al. Using Random Forest to Learn Imbalanced Data , 2004 .
[149] Benjamin C. M. Fung,et al. Anonymizing healthcare data: a case study on the blood transfusion service , 2009, KDD.
[150] Kim-Kwang Raymond Choo,et al. Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? , 2018, IEEE Cloud Computing.
[151] Nicola Guarino,et al. Ontologies and Knowledge Bases. Towards a Terminological Clarification , 1995 .
[152] Dympna O'Sullivan,et al. The Role of Explanations on Trust and Reliance in Clinical Decision Support Systems , 2015, 2015 International Conference on Healthcare Informatics.
[153] Lorrie Faith Cranor,et al. Protecting people from phishing: the design and evaluation of an embedded training email system , 2007, CHI.
[154] S. K. Gupta,et al. Abstractive summarization: An overview of the state of the art , 2019, Expert Syst. Appl..
[155] Joan Hash,et al. SP 800-50. Building an Information Technology Security Awareness and Training Program , 2003 .
[156] Eric S. K. Yu,et al. Business-driven data analytics: A conceptual modeling framework , 2018, Data Knowl. Eng..
[157] Bernhard Rumpe,et al. The UML as a formal modeling notation , 1998, Comput. Stand. Interfaces.
[158] Soumya Paul,et al. A Probabilistic Analysis of the Efficiency of Automated Software Testing , 2016, IEEE Transactions on Software Engineering.
[159] Alexander Hars,et al. Working for Free? Motivations for Participating in Open-Source Projects , 2002, Int. J. Electron. Commer..
[160] Thomas R. Gruber,et al. A translation approach to portable ontology specifications , 1993, Knowl. Acquis..
[161] Rossana M. de Castro Andrade,et al. GreaTest: a card game to motivate the software testing learning , 2018, SBES.
[162] Xuelong Li,et al. Tensors in Image Processing and Computer Vision , 2009, Advances in Pattern Recognition.
[163] In Lee,et al. The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .
[164] Nikolay Mehandjiev,et al. Modeling of privacy-aware business processes in BPMN to protect personal data , 2014, SAC.
[165] Erik Perjons,et al. An Introduction to Design Science , 2014, Springer International Publishing.
[166] Randy C. Paffenroth,et al. Anomaly Detection with Robust Deep Autoencoders , 2017, KDD.
[167] Maria Virvou,et al. Based on GDPR privacy in UML: Case of e-learning program , 2017, 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA).
[168] Richard Baskerville,et al. Going back to basics in design science: from the information technology artifact to the information systems artifact , 2015, Inf. Syst. J..
[169] Haralambos Mouratidis,et al. Secure Tropos: a Security-Oriented Extension of the Tropos Methodology , 2007, Int. J. Softw. Eng. Knowl. Eng..
[170] Ksenija Vuković. Small and medium sized enterprises in European Union , 2012 .
[171] Sooyong Park,et al. A modeling framework for business process reengineering using big data analytics and a goal-orientation , 2017, 2017 11th International Conference on Research Challenges in Information Science (RCIS).
[172] Andrew P. McAfee,et al. Machine, Platform, Crowd: Harnessing Our Digital Future , 2017 .
[173] Stefanos Gritzalis,et al. NETp1-08: Requirements and Challenges in the Design of Privacy-aware Sensor Networks , 2006, IEEE Globecom 2006.
[174] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[175] Marlon Dumas. On the Convergence of Data and Process Engineering , 2011, ADBIS.
[176] Roland Imhoff,et al. What Motivates Nonconformity? Uniqueness Seeking Blocks Majority Influence , 2009, Personality & social psychology bulletin.
[177] Chi Wu-Lee,et al. Toward A Service Platform for Developing Smart Contracts on Blockchain in BDD and TDD Styles , 2017, 2017 IEEE 10th Conference on Service-Oriented Computing and Applications (SOCA).
[178] Sander J. J. Leemans,et al. Scalable process discovery and conformance checking , 2016, Software & Systems Modeling.
[179] Sarah Spiekermann,et al. Online social networks: why we disclose , 2010, J. Inf. Technol..
[180] Jeanne W. Ross,et al. Designing and Executing Digital Strategies , 2016, ICIS.
[181] Tor Eriksson,et al. Unemployment Flows in Finland, 1969–95: A Time Series Analysis , 1998 .
[182] Dirk Fahland,et al. Repairing Process Models to Reflect Reality , 2012, BPM.
[183] Oscar González Rojas,et al. Analysis and Re-configuration of Decision Logic in Adaptive and Data-Intensive Processes (Short Paper) , 2017, OTM Conferences.
[184] Uyen Trang Nguyen,et al. A new algorithm for money laundering detection based on structural similarity , 2016, 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).
[185] Diego Calvanese,et al. Semantics and Analysis of DMN Decision Tables , 2016, BPM.
[186] Paolo Giorgini,et al. Analyzing Trust Requirements in Socio-Technical Systems: A Belief-Based Approach , 2015, PoEM.
[187] Michael Coughlan,et al. Interviewing in qualitative research: The one-to-one interview , 2009 .
[188] Wil M. P. van der Aalst,et al. Business Process Simulation Survival Guide , 2015, Handbook on Business Process Management.
[189] A. Parry. Handbook of Qualitative Research , 2002 .
[190] N. M. Oskorbin,et al. Game-Theoretic Models of Incentive and Control Strategies in Social and Economic Systems , 2015, Cybern. Syst..
[191] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[192] Amanda Nolen,et al. Thematic analysis of qualitative research data: Is it as easy as it sounds? , 2018, Currents in pharmacy teaching & learning.
[193] Veda C. Storey,et al. Design science in the information systems discipline: an introduction to the special issue on design science research , 2008 .
[194] Geoffrey B. Sprinkle,et al. The effects of monetary incentives on effort and task performance: theories, evidence, and a framework for research , 2002 .
[195] Kiev Gama. Crowdsourced Software Development in Civic Apps - Motivations of Civic Hackathons Participants , 2017, ICEIS.
[196] Boudewijn F. van Dongen,et al. Process Mining: Overview and Outlook of Petri Net Discovery Algorithms , 2009, Trans. Petri Nets Other Model. Concurr..
[197] Enrique Onieva,et al. Multi-head CNN-RNN for multi-time series anomaly detection: An industrial case study , 2019, Neurocomputing.
[198] Yu-To Chen,et al. Fuzzy Computing Applications for Anti-Money Laundering and Distributed Storage System Load Monitoring , 2011 .
[199] Anne Piret,et al. L'analyse structurale. Une méthode d'analyse de contenu pour les sciences humaines, Bruxelles, De Boeck, 173p , 1996 .
[200] Werner Ceusters,et al. Aboutness: towards foundations for the Information Artifact Ontology , 2015, ICBO.
[201] Gustavo Rossi,et al. 25 Years of Model-Driven Web Engineering: What we achieved, What is missing , 2016, CLEI Electron. J..
[202] Mario Piattini,et al. A Data Quality in Use model for Big Data , 2016, Future Gener. Comput. Syst..
[203] F. Petngang,et al. Security and privacy protection for automated video surveillance , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.
[204] Kent McPhee,et al. Design Theory and Software Design , 1996 .
[205] Yasin Kütük,et al. PREDICTION OF TRANSITION PROBABILITIES FROM UNEMPLOYMENT TO EMPLOYMENT FOR TURKEY VIA MACHINE LEARNING AND ECONOMETRICS: A COMPARATIVE STUDY , 2019 .
[206] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[207] Varun Grover,et al. Creating Strategic Business Value from Big Data Analytics: A Research Framework , 2018, J. Manag. Inf. Syst..
[208] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[209] Mathias Weske,et al. A Tool for Checking Soundness of Decision-Aware Business Processes , 2017, BPM.
[210] Peng Li,et al. Similarity Metric Learning for Face Recognition , 2013, 2013 IEEE International Conference on Computer Vision.
[211] Ahmad Ashari,et al. Review of Ontology Evolution Process , 2018 .
[212] Claus Pahl,et al. A Pattern-Based Framework of Change Operators for Ontology Evolution , 2009, OTM Workshops.
[213] Yunming Ye,et al. A Hierarchical Model with Recurrent Convolutional Neural Networks for Sequential Sentence Classification , 2019, NLPCC.
[214] Stephen L. Vargo,et al. Conceptualizing Value: A Service-ecosystem View , 2017 .
[215] Edward P. Lazear,et al. The Power of Incentives , 2000 .
[216] Lin-Tao Lv,et al. A RBF neural network model for anti-money laundering , 2008, 2008 International Conference on Wavelet Analysis and Pattern Recognition.
[217] Claus Pahl,et al. Ontology Change Management and Identification of Change Patterns , 2013, Journal on Data Semantics.
[218] Felix Hill,et al. Learning Distributed Representations of Sentences from Unlabelled Data , 2016, NAACL.
[219] Ming Yang,et al. DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[220] Tanja E. J. Vos,et al. Evaluating the FITTEST Automated Testing Tools: An Industrial Case Study , 2013, 2013 ACM / IEEE International Symposium on Empirical Software Engineering and Measurement.
[221] Jens Bürger,et al. A framework for semi-automated co-evolution of security knowledge and system models , 2018, J. Syst. Softw..
[222] Rachid Chalal,et al. EXODuS: Exploratory OLAP over Document Stores , 2017, Inf. Syst..
[223] Kwan-Liu Ma,et al. Opening the black box - data driven visualization of neural networks , 2005, VIS 05. IEEE Visualization, 2005..
[224] Johannes De Smedt,et al. Augmenting processes with decision intelligence: Principles for integrated modelling , 2018, Decis. Support Syst..
[225] J. Borges,et al. A TAXONOMY OF PRIVACY , 2006 .
[226] Daniela E. Damian,et al. ACon: A learning-based approach to deal with uncertainty in contextual requirements at runtime , 2016, Inf. Softw. Technol..
[227] Abdelkarim Erradi,et al. A service computing manifesto: the next 10 years , 2017, Commun. ACM.
[228] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[229] Ana Alice Baptista,et al. How to Measure Influence in Social Networks? , 2020, RCIS.
[230] Paolo Giorgini,et al. Modeling and Reasoning About Information Quality Requirements , 2015, REFSQ.
[231] Yann LeCun,et al. Dimensionality Reduction by Learning an Invariant Mapping , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).
[232] Eduard H. Hovy,et al. Automatic Evaluation of Summaries Using N-gram Co-occurrence Statistics , 2003, NAACL.
[233] Thierry Poibeau,et al. Multi-source, Multilingual Information Extraction and Summarization , 2012, Theory and Applications of Natural Language Processing.
[234] Vera Künzle,et al. PHILharmonicFlows: towards a framework for object-aware process management , 2011, J. Softw. Maintenance Res. Pract..
[235] Jong-Hyouk Lee,et al. Analysis of the main consensus protocols of blockchain , 2020, ICT Express.
[236] Peter A. Johnson,et al. Civic Hackathons: Innovation, Procurement, or Civic Engagement? , 2014 .
[237] Matteo Pagliardini,et al. Unsupervised Learning of Sentence Embeddings Using Compositional n-Gram Features , 2017, NAACL.
[238] R. Cialdini. Influence: The Psychology of Persuasion , 1993 .
[239] Yangyong Zhu,et al. The Challenges of Data Quality and Data Quality Assessment in the Big Data Era , 2015, Data Sci. J..
[240] Miikka Rokkanen,et al. Changes in Job Stability: Evidence from Lifetime Job Histories , 2010, SSRN Electronic Journal.
[241] Ina Schieferdecker,et al. Model-Driven Testing: Using the UML Testing Profile , 2007 .
[242] Giancarlo Guizzardi,et al. Grounding Software Domain Ontologies in the Unified Foundational Ontology (UFO): The case of the ODE Software Process Ontology , 2008, CIbSE.
[243] Wil M. P. van der Aalst,et al. Interactive Data-Driven Process Model Construction , 2018, ER.
[244] Norman Spangenberg,et al. An Architectural Blueprint for a Multi-purpose Anomaly Detection on Data Streams , 2019, ICEIS.
[245] Thomas M. Breuel,et al. Anomaly detection by combining decision trees and parametric densities , 2008, 2008 19th International Conference on Pattern Recognition.
[246] Phil Blunsom,et al. Teaching Machines to Read and Comprehend , 2015, NIPS.
[247] Jolita Ralyté. Towards a Method Family Supporting Information Services Co-Creation in the Transdisciplinary Context , 2013, Int. J. Inf. Syst. Model. Des..
[248] Ilia Bider,et al. Design Science Research as Movement Between Individual and Generic Situation-Problem–Solution Spaces , 2013 .
[249] Hamed Taherdoost,et al. A Review of Technology Acceptance and Adoption Models and Theories , 2023, International Journal For Multidisciplinary Research.
[250] Li Xiong,et al. A two-phase algorithm for mining sequential patterns with differential privacy , 2013, CIKM.
[251] Peter J. Clarke,et al. Gamification-Based Cyber-Enabled Learning Environment of Software Testing , 2016 .
[252] Robert B. France,et al. Defining Precise Semantics for UML , 2000, ECOOP Workshops.
[253] Y. R. Storch Rudall,et al. Business Model Generation , 2012 .
[254] Paolo Giorgini,et al. GRAnD: A goal-oriented approach to requirement analysis in data warehouses , 2008, Decis. Support Syst..
[255] Ashish Sureka,et al. A Case Study on the Application of Case-Based Learning in Software Testing , 2018, ISEC.
[256] Maleknaz Nayebi,et al. Toward Data-Driven Requirements Engineering , 2016, IEEE Software.
[257] Sanming Zhou,et al. Networking for Big Data: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[258] Patrick Delfmann,et al. Decision model change patterns for dynamic system evolution , 2020, Knowledge and Information Systems.
[259] A. Pfitzmann,et al. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .
[260] Gerhard Tutz,et al. Modeling Discrete Time-To-Event Data , 2016 .
[261] Gennaro Imparato,et al. A Combined Technique of GUI Ripping and Input Perturbation Testing for Android Apps , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[262] Olga De Troyer,et al. Understanding ontology evolution: A change detection approach , 2007, J. Web Semant..
[263] Gordon J. Pace,et al. An Automata-Based Approach to Evolving Privacy Policies for Social Networks , 2016, RV.
[264] Franck Dernoncourt,et al. Neural Networks for Joint Sentence Classification in Medical Paper Abstracts , 2017, EACL.
[265] Jeffrey M. Voas,et al. Demystifying the Internet of Things , 2016, Computer.
[266] W. Eric Wong,et al. Improving the State of Undergraduate Software Testing Education , 2012 .
[267] Ahmed Awad,et al. Extending BPSim Based on Workflow Resource Patterns , 2018, BIS.
[268] Tsung-Ting Kuo,et al. Comparison of blockchain platforms: a systematic review and healthcare examples , 2019, J. Am. Medical Informatics Assoc..
[269] Oscar González Rojas,et al. Simod: A Tool for Automated Discovery of Business Process Simulation Models , 2019, BPM.
[270] Janet Smithson,et al. Using and analysing focus groups: Limitations and possibilities , 2000 .
[271] Paul W. P. J. Grefen,et al. Quantitative Effects of Advanced Resource Constructs in Business Process Simulation , 2018, 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC).
[272] Kraig Finstad,et al. The Usability Metric for User Experience , 2010, Interact. Comput..
[273] Kihyuk Sohn,et al. Improved Deep Metric Learning with Multi-class N-pair Loss Objective , 2016, NIPS.
[274] Bela H. Banathy,et al. SYSTEMS INQUIRY AND ITS APPLICATION IN EDUCATION , 2003 .
[275] Nava Tintarev,et al. Reading News with a Purpose: Explaining User Profiles for Self-Actualization , 2019, UMAP.
[276] Yuan Gao,et al. Deep Gate Recurrent Neural Network , 2016, ACML.
[277] Xiaogang Wang,et al. Deep Learning Face Representation by Joint Identification-Verification , 2014, NIPS.
[278] Kangde Yao,et al. A Brief Guide to the Standard Object Modelling Language , 2000 .
[279] Martin Schumacher,et al. Competing Risks and Multistate Models with R , 2011 .
[280] Alan R. Hevner,et al. POSITIONING AND PRESENTING DESIGN SCIENCE RESEARCH FOR MAXIMUM IMPACT 1 , 2013 .
[281] Xiaowei Xu,et al. Text Embeddings for Retrieval From a Large Knowledge Base , 2018, RCIS.
[282] Veda C. Storey,et al. Big data technologies and Management: What conceptual modeling can do , 2017, Data Knowl. Eng..
[283] Yücel Saygin,et al. Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.
[284] Vassilis Christophides,et al. On Detecting High-Level Changes in RDF/S KBs , 2009, SEMWEB.
[285] Sooyong Park,et al. Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.
[286] Viktor Mikhaĭlovich Glushkov,et al. An Introduction to Cybernetics , 1957, The Mathematical Gazette.
[287] Manish Kumar,et al. Anomaly Detection using Decision Tree based Classifiers , 2016 .
[288] Michael Gusenbauer,et al. Google Scholar to overshadow them all? Comparing the sizes of 12 academic search engines and bibliographic databases , 2018, Scientometrics.
[289] Monique Snoeck,et al. Existence Dependency: The Key to Semantic Integrity Between Structural and Behavioral Aspects of Object Types , 1998, IEEE Trans. Software Eng..
[290] Alex Norta,et al. The State of the Art for Blockchain-Enabled Smart-Contract Applications in the Organization , 2018, 2018 Ivannikov Ispras Open Conference (ISPRAS).
[291] Paolo Tonella,et al. A case study-based comparison of web testing techniques applied to AJAX web applications , 2008, International Journal on Software Tools for Technology Transfer.
[292] Chen Fu,et al. Experimental assessment of manual versus tool-based maintenance of GUI-directed test scripts , 2009, 2009 IEEE International Conference on Software Maintenance.
[293] Mohamed Adel Serhani,et al. Big Data Quality: A Survey , 2018, 2018 IEEE International Congress on Big Data (BigData Congress).
[294] Nava Tintarev,et al. Someone really wanted that song but it was not me!: Evaluating Which Information to Disclose in Explanations for Group Recommendations , 2020, IUI Companion.
[295] Thomas R. Gruber,et al. Toward principles for the design of ontologies used for knowledge sharing? , 1995, Int. J. Hum. Comput. Stud..
[296] Tanja E. J. Vos,et al. Combinatorial Testing in an Industrial Environment -- Analyzing the Applicability of a Tool , 2014, 2014 9th International Conference on the Quality of Information and Communications Technology.
[297] Xavier Franch,et al. FAME: Supporting Continuous Requirements Elicitation by Combining User Feedback and Monitoring , 2018, 2018 IEEE 26th International Requirements Engineering Conference (RE).
[298] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[299] Wil M. P. van der Aalst,et al. Supporting Confidentiality in Process Mining Using Abstraction and Encryption , 2018, SIMPDA.
[300] Jan-Philipp Steghöfer,et al. Impact of Gamification on Trace Link Vetting: A Controlled Experiment , 2019, REFSQ.
[301] Livio Robaldo,et al. PrOnto: Privacy Ontology for Legal Reasoning , 2018, EGOVIS.
[302] Philip S. Yu,et al. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques , 2010 .
[303] David E. Goldberg,et al. A niched Pareto genetic algorithm for multiobjective optimization , 1994, Proceedings of the First IEEE Conference on Evolutionary Computation. IEEE World Congress on Computational Intelligence.
[304] G. Zajicek,et al. The Wisdom of the Body , 1934, Nature.
[305] John Mylopoulos,et al. Representing and Using Nonfunctional Requirements: A Process-Oriented Approach , 1992, IEEE Trans. Software Eng..
[306] Jemal H. Abawajy,et al. User preference of cyber security awareness delivery methods , 2014, Behav. Inf. Technol..
[307] B.M. Wilamowski,et al. Neural network architectures and learning algorithms , 2009, IEEE Industrial Electronics Magazine.
[308] Mike Cohn,et al. Succeeding with Agile: Software Development Using Scrum , 2009 .
[309] John Mylopoulos,et al. Strategic business modeling: representation and reasoning , 2014, Software & Systems Modeling.
[310] Pearl Brereton,et al. Presenting software engineering results using structured abstracts: a randomised experiment , 2008, Empirical Software Engineering.
[311] Paul Janssen,et al. Frailty Model , 2007, International Encyclopedia of Statistical Science.
[312] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[313] Sung-Bae Cho,et al. Web traffic anomaly detection using C-LSTM neural networks , 2018, Expert Syst. Appl..
[314] Winston H. Hsu,et al. Real-time privacy-preserving moving object detection in the cloud , 2013, ACM Multimedia.
[315] Walid Maalej,et al. On the automatic classification of app reviews , 2016, Requirements Engineering.
[316] A Arya Adriansyah,et al. Aligning observed and modeled behavior , 2014 .
[317] Matthias Mettler,et al. Blockchain technology in healthcare: The revolution starts here , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).
[318] Hamid H. Jebur,et al. Machine Learning Techniques for Anomaly Detection: An Overview , 2013 .
[319] Juha Kettunen,et al. Education and unemployment duration , 1997 .
[320] E. L. Jones. An experiential approach to incorporating software testing into the computer science curriculum , 2001, 31st Annual Frontiers in Education Conference. Impact on Engineering and Science Education. Conference Proceedings (Cat. No.01CH37193).
[321] R. Barthes. Introduction à l'analyse structurale des récits , 1966 .
[322] James M. Olson,et al. False feedback about placebo effectiveness: consequences for the misattribution of speech anxiety , 1988 .
[323] Wil M. P. van der Aalst,et al. Mining Roles from Event Logs While Preserving Privacy , 2019, Business Process Management Workshops.
[324] Juri Marcucci,et al. The Predictive Power of Google Searches in Forecasting Unemployment , 2012 .
[325] Diego Calvanese,et al. Semantic DMN: Formalizing Decision Models with Domain Knowledge , 2017, RuleML+RR.
[326] Maguelonne Teisseire,et al. Privacy preserving sequential pattern mining in distributed databases , 2006, CIKM '06.
[327] Gary B. Lamont,et al. Evolutionary Algorithms for Solving Multi-Objective Problems , 2002, Genetic Algorithms and Evolutionary Computation.
[328] Kilian Q. Weinberger,et al. Distance Metric Learning for Large Margin Nearest Neighbor Classification , 2005, NIPS.
[329] O. John,et al. Measuring personality in one minute or less: A 10-item short version of the Big Five Inventory in English and German , 2007 .
[330] Manuel Resinas,et al. On the definition and design-time analysis of process performance indicators , 2013, Inf. Syst..
[331] Sungyoung Lee,et al. Ontology Evolution and Challenges , 2013, J. Inf. Sci. Eng..
[332] Enrico Motta,et al. Ontology evolution: a process-centric survey , 2013, The Knowledge Engineering Review.
[333] Monique Snoeck,et al. Co-creating e-Government Services: An Empirical Analysis of Participation Methods in Belgium , 2019, Public Administration and Information Technology.
[334] B. S. Manoj,et al. IoT Enablers and Their Security and Privacy Issues , 2016 .
[335] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[336] Colin Tankard,et al. What the GDPR means for businesses , 2016, Netw. Secur..
[337] Diana K. Smetters,et al. Moving from the design of usable security technologies to the design of useful secure applications , 2002, NSPW '02.
[338] Michael R. Wagner,et al. Incentive Contracts in Serial Stochastic Projects , 2015, Manuf. Serv. Oper. Manag..
[339] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[340] Wu He,et al. Gender difference and employees' cybersecurity behaviors , 2017, Comput. Hum. Behav..
[341] Marlon Dumas,et al. Interactive and Incremental Business Process Model Repair , 2017, OTM Conferences.
[342] Gary Leeming,et al. A Ledger of Me: Personalizing Healthcare Using Blockchain Technology , 2019, Front. Med..
[343] Boudewijn F. van Dongen,et al. Measuring precision of modeled behavior , 2015, Inf. Syst. E Bus. Manag..
[344] Reinhold Plösch,et al. Operationalised product quality models and assessment: The Quamoco approach , 2014, Inf. Softw. Technol..
[345] James C. Spohrer,et al. Rebuilding Evolution: A Service Science Perspective , 2017, HICSS.
[346] T. Salthouse,et al. Personality-cognition relations across adulthood. , 2011, Developmental psychology.
[347] Samy Bengio,et al. Large Scale Online Learning of Image Similarity Through Ranking , 2009, J. Mach. Learn. Res..
[348] Abhishek Awasthi,et al. Clustering Algorithms for Anti-Money Laundering Using Graph Theory and Social Network Analysis , 2012 .
[349] Ilia Bider,et al. State Flow as a Way of Analyzing Business Processes - Case Studies , 2002 .
[350] Kat Krol,et al. Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours , 2016, SOUPS.
[351] Werner Wolf,et al. The Musicalization of Fiction.A Study in the Theory and History of Intermediality. , 1999 .
[352] Jan Vanthienen,et al. A Case-Based Inquiry into the Decision Model and Notation (DMN) and the Knowledge Base (KB) Paradigm , 2018, RuleML+RR.
[353] Ninghui Li,et al. On the tradeoff between privacy and utility in data publishing , 2009, KDD.
[354] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[355] Karen Spärck Jones. Automatic summarising: The state of the art , 2007, Inf. Process. Manag..
[356] Chitu Okoli,et al. A Guide to Conducting a Systematic Literature Review of Information Systems Research , 2010 .
[357] Pearl Brereton,et al. Lessons from applying the systematic literature review process within the software engineering domain , 2007, J. Syst. Softw..
[358] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[359] Thomas Blaschke,et al. Myths and realities about the recovery of L׳Aquila after the earthquake , 2014, International journal of disaster risk reduction : IJDRR.
[360] Bogusław Cyganek,et al. Speckle Noise Filtering in Side-Scan Sonar Images Based on the Tucker Tensor Decomposition , 2019, Sensors.
[361] Markus Helfert,et al. Standardisation of enterprise architecture development for smart cities , 2019, Journal of the Knowledge Economy.
[362] David Romero,et al. Enterprise information systems state of the art: Past, present and future trends , 2016, Comput. Ind..
[363] Su-nan Wang,et al. A Money Laundering Risk Evaluation Method Based on Decision Tree , 2007, 2007 International Conference on Machine Learning and Cybernetics.
[364] John K. Gilbert,et al. Understanding modelling in technology and science: the potential of stories from the field , 2011 .
[365] Jaap Gordijn,et al. Value-based requirements engineering: exploring innovative e-commerce ideas , 2003, Requirements Engineering.
[366] Nagia M. Ghanem,et al. VSCAN: An Enhanced Video Summarization Using Density-Based Spatial Clustering , 2013, ICIAP.
[367] Kurt Sandkuhl,et al. Digital Enterprise Architecture - Transformation for the Internet of Things , 2015, 2015 IEEE 19th International Enterprise Distributed Object Computing Workshop.
[368] Heru Susanto,et al. Information Security Awareness Within Business Environment: An IT Review , 2012, ArXiv.
[369] Christos Katris. Prediction of Unemployment Rates with Time Series and Machine Learning Techniques , 2020 .
[370] Felix Mannhardt,et al. Sepsis Cases - Event Log , 2016 .
[371] Geoffrey E. Mills. Action Research: A Guide for the Teacher Researcher , 1999 .
[372] Roel Wieringa,et al. Design Science Methodology for Information Systems and Software Engineering , 2014, Springer Berlin Heidelberg.
[373] Faïez Gargouri,et al. BigDimETL with NoSQL Database , 2018, KES.
[374] R. Kaplan,et al. Linking the Balanced Scorecard to Strategy , 1996 .
[375] Andrew Lippman,et al. A Case Study for Blockchain in Healthcare : “ MedRec ” prototype for electronic health records and medical research data , 2016 .
[376] Jian Zhang,et al. SQuAD: 100,000+ Questions for Machine Comprehension of Text , 2016, EMNLP.
[377] Richard F. Paige,et al. The Single Model Principle , 2002, J. Object Technol..
[378] Shiguo Wang,et al. A Comprehensive Survey of Data Mining-Based Accounting-Fraud Detection Research , 2010, 2010 International Conference on Intelligent Computation Technology and Automation.
[379] Trisha Greenhalgh,et al. Selecting, designing, and developing your questionnaire , 2004, BMJ : British Medical Journal.
[380] László Böszörményi,et al. State-of-the-art and future challenges in video scene detection: a survey , 2013, Multimedia Systems.
[381] Melvin R. Crask,et al. Protection motivation theory : An extension of fear appeals theory in communication , 1989 .
[382] Marko Vukolic,et al. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.
[383] Andrea Bondavalli,et al. A conceptual model for analyzing information quality in System-of-Systems , 2017, 2017 12th System of Systems Engineering Conference (SoSE).
[384] Rein Turn. Classification of personal information for privacy protection purposes , 1976, AFIPS '76.
[385] Xavier Franch,et al. How Can Quality Awareness Support Rapid Software Development? - A Research Preview , 2017, REFSQ.
[386] Mikael Berndtsson,et al. Becoming a Data-Driven Organisation , 2018, ECIS.
[387] Davor Svetinovic,et al. A taxonomy of security and privacy requirements for the Internet of Things (IoT) , 2014, 2014 IEEE International Conference on Industrial Engineering and Engineering Management.
[388] Nader Sadegh,et al. A perceptron network for functional identification and control of nonlinear systems , 1993, IEEE Trans. Neural Networks.
[389] Fabiano Dalpiaz,et al. Conceptualizing Requirements Using User Stories and Use Cases: A Controlled Experiment , 2020, REFSQ.
[390] Shigeaki Yamazaki,et al. Adoption of structured abstracts by general medical journals and format for a structured abstract. , 2005, Journal of the Medical Library Association : JMLA.
[391] Martijn Zoet,et al. Verification capabilities for business rules management in the Dutch governmental context , 2017, 2017 International Conference on Research and Innovation in Information Systems (ICRIIS).
[392] Christopher D. Manning,et al. Effective Approaches to Attention-based Neural Machine Translation , 2015, EMNLP.
[393] Weng-Keen Wong,et al. Principles of Explanatory Debugging to Personalize Interactive Machine Learning , 2015, IUI.
[394] Erland Jonsson,et al. Synthesizing test data for fraud detection systems , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[395] James Philbin,et al. FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[396] Sabine Buckl,et al. On the State-of-the-Art in Enterprise Architecture Management Literature , 2011 .
[397] Stephen H. Edwards,et al. Experiences using test-driven development with an automated grader , 2007 .
[398] Hector Garcia-Molina,et al. Combating Web Spam with TrustRank , 2004, VLDB.
[399] Lisanne Bainbridge,et al. Ironies of automation , 1982, Autom..
[400] David Clark,et al. Computers at risk: safe computing in the information age , 1991 .
[401] Fabrizio Maria Maggi,et al. A Tool for the Analysis of DMN Decision Tables , 2016, BPM.
[402] Raian Ali,et al. Personalising Explainable Recommendations: Literature and Conceptualisation , 2020, WorldCIST.
[403] Bogusław Cyganek,et al. Object Detection and Recognition in Digital Images: Theory and Practice , 2013 .
[404] Wei Dong,et al. Human factors in software security risk management , 2008, LMSA '08.
[405] Sam Newman,et al. Building microservices - designing fine-grained systems, 1st Edition , 2015 .
[406] Michael Chromik,et al. Dark Patterns of Explainability, Transparency, and User Control for Intelligent Systems , 2019, IUI Workshops.
[407] Ilia Bider,et al. Using Enterprise Models to Explain and Discuss Autopoiesis and Homeostasis in Socio-technical Systems , 2020, Complex Syst. Informatics Model. Q..
[408] Lorena Otero-Cerdeira,et al. Ontology matching: A literature review , 2015, Expert Syst. Appl..
[409] Tomi Kyyrä,et al. Partial Unemployment Insurance Benefits and the Transition Rate to Regular Work , 2008 .
[410] Christopher D. Manning,et al. Get To The Point: Summarization with Pointer-Generator Networks , 2017, ACL.
[411] Neil A. M. Maiden,et al. Applying Modular Method Engineering to Validate and Extend the RESCUE Requirements Process , 2005, ER.
[412] Klaus F. Zimmermann,et al. A panel analysis of job changes and unemployment , 1994 .
[413] Philip S. Yu,et al. Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.
[414] Oscar Pastor,et al. Verifying goal-oriented specifications used in model-driven development processes , 2017, Inf. Syst..
[415] Deborah L. McGuinness,et al. Toward establishing trust in adaptive agents , 2008, IUI '08.
[416] David A. Cohn,et al. Improving generalization with active learning , 1994, Machine Learning.
[417] Liping Zhao,et al. Natural Language Processing (NLP) for Requirements Engineering: A Systematic Mapping Study , 2020, ArXiv.
[418] Krishna P. Gummadi,et al. Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebooks Explanations , 2018, NDSS.
[419] T.E. Boult,et al. PICO: Privacy through Invertible Cryptographic Obscuration , 2005, Computer Vision for Interactive and Intelligent Environment (CVIIE'05).
[420] Yanjun Qi,et al. Empirical Evaluation of Workload Forecasting Techniques for Predictive Cloud Resource Scaling , 2016, 2016 IEEE 9th International Conference on Cloud Computing (CLOUD).
[421] A. Tiwana,et al. Beyond Valuation: “Options Thinking” in IT Project Management , 2005 .
[422] Dhiren Patel,et al. A Survey on Internet of Things: Security and Privacy Issues , 2014 .
[423] David Simms,et al. The Heart of Enterprise , 1980 .
[424] Prateek Mittal,et al. Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[425] Bogusław Cyganek,et al. Thumbnail Tensor—A Method for Multidimensional Data Streams Clustering with an Efficient Tensor Subspace Model in the Scale-Space † , 2019, Sensors.
[426] Tariq M. King,et al. Integrating Testing into Software Engineering Courses Supported by a Collaborative Learning Environment , 2014, TOCE.
[427] Lucy Kimbell,et al. Rethinking Design Thinking: Part I , 2011 .
[428] Mohammed Zuhair Al-Taie,et al. Visualization of Explanations in Recommender Systems , 2014 .
[429] Mathias Weske,et al. Decision Management in the Insurance Industry: Standards and Tools , 2017, BPM.
[430] Amutha Prabakar Muniyandi,et al. Network Anomaly Detection by Cascading K-Means Clustering and C4.5 Decision Tree algorithm , 2012 .
[431] Selmin Nurcan,et al. Model Driven Architectures for Enterprise Information Systems , 2004, CAiSE.
[432] Henk Corporaal,et al. Analytics for the internet of things , 2009, CHI Extended Abstracts.
[433] Kurt Eiselt,et al. Understanding and improving the culture of hackathons: Think global hack local , 2015, 2015 IEEE Frontiers in Education Conference (FIE).
[434] Lukasz Kaiser,et al. Attention is All you Need , 2017, NIPS.
[435] David Budgen,et al. Reporting computing projects through structured abstracts: a quasi-experiment , 2011, Empirical Software Engineering.
[436] Janna Hastings,et al. A scoping review of ontologies related to human behaviour change , 2019, Nature Human Behaviour.
[437] Shang Gao,et al. Smart contract applications within blockchain technology: A systematic mapping study , 2018, Telematics Informatics.
[438] Olivier Teste,et al. Automatic Classification Rules for Anomaly Detection in Time-Series , 2020, RCIS.
[439] Anjana Gosain,et al. Literature Review of Data Model Quality Metrics of Data Warehouse , 2015 .
[440] Elizabeth Chang,et al. Application of Protege and SPARQL in the field of project knowledge management , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).
[441] Kathryn B. Laskey,et al. Developing an Ontology for Individual and Organizational Sociotechnical Indicators of Insider Threat Risk , 2016, STIDS.
[442] Faïez Gargouri,et al. ETL Based Framework for NoSQL Warehousing , 2017, EMCIS.
[443] Werner Ceusters,et al. An Information Artifact Ontology Perspective on Data Collections and Associated Representational Artifacts , 2012, MIE.
[444] Vahid Garousi,et al. Comparing automated visual GUI testing tools: an industrial case study , 2017, A-TEST@ESEC/SIGSOFT FSE.
[445] E. Glass,et al. A rapid and robust sequence-based genotyping method for BoLA-DRB3 alleles in large numbers of heterozygous cattle. , 2008, Animal genetics.
[446] Diego Calvanese,et al. Semantics, Analysis and Simplification of DMN Decision Tables , 2018, Inf. Syst..
[447] David G. Lowe,et al. Similarity Metric Learning for a Variable-Kernel Classifier , 1995, Neural Computation.
[448] Mike Uschold,et al. Building Ontologies: Towards a Unified Methodology , 1996 .
[449] Andrey Kashlev,et al. A Big Data Modeling Methodology for Apache Cassandra , 2015, 2015 IEEE International Congress on Big Data.
[450] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[451] Matthias Weidlich,et al. Privacy-Preserving Process Mining , 2019, Business & Information Systems Engineering.
[452] Diane M. Strong,et al. Beyond Accuracy: What Data Quality Means to Data Consumers , 1996, J. Manag. Inf. Syst..
[453] D. Wiegmann,et al. Similarities and differences between human–human and human–automation trust: an integrative review , 2007 .
[454] Manuel Díaz,et al. On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..
[455] Moe Thandar Wynn,et al. Modelling Complex Resource Requirements in Business Process Management Systems , 2010 .
[456] Peter Müller,et al. A Program Logic for Bytecode , 2005, Electron. Notes Theor. Comput. Sci..
[457] Margarida Silveira,et al. Unsupervised Anomaly Detection in Energy Time Series Data Using Variational Recurrent Autoencoders with Attention , 2018, 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA).
[458] Jens Bürger,et al. Maintaining requirements for long-living software systems by incorporating security knowledge , 2014, 2014 IEEE 22nd International Requirements Engineering Conference (RE).
[459] I. Ajzen,et al. Attitudes and the Attitude-Behavior Relation: Reasoned and Automatic Processes , 2000 .
[460] Monique Snoeck,et al. Consistency by Construction: The Case of MERODE , 2003, ER.
[461] Xu An Wang,et al. Key Technologies of Anomaly Detection Using PCA-LSTM , 2019, IMIS.
[462] Samira Si-Said Cherfi,et al. Data quality in ETL process: A preliminary study , 2019, KES.
[463] Christoph Treude,et al. Google Summer of Code: Student Motivations and Contributions , 2019, J. Syst. Softw..
[464] Michael Jackson,et al. The World and the Machine , 1995, 1995 17th International Conference on Software Engineering.
[465] Diane C. P. Smith,et al. Database abstractions: aggregation and generalization , 1977, TODS.
[466] Rob Davis,et al. ARIS Design Platform: Getting Started with BPM , 2007 .
[467] Nicola Ueffing,et al. Improved models for automatic punctuation prediction for spoken and written text , 2013, INTERSPEECH.
[468] Guy Doumeingts,et al. GRAI integrated methodology and its mapping onto generic enterprise reference architecture and methodology , 1997 .
[469] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[470] Wil M. P. van der Aalst,et al. Responsible Data Science: Using Event Data in a "People Friendly" Manner , 2016, ICEIS.
[471] J Peder,et al. UNEMPLOYMENT : A REVIEW OF THE EVIDENCE FRQM PANEL DATA , 2004 .
[472] Oscar González Rojas,et al. Automated Discovery of Business Process Simulation Models from Event Logs , 2020, Decis. Support Syst..
[473] Marc J. de Vries,et al. Models as artefacts of a dual nature: a philosophical contribution to teaching about models designed and used in engineering practice , 2017 .
[474] R. Baumeister,et al. High self-control predicts good adjustment, less pathology, better grades, and interpersonal success. , 2004, Journal of personality.
[475] Benjamin Van Durme,et al. Annotated Gigaword , 2012, AKBC-WEKEX@NAACL-HLT.
[476] Sherif Sakr,et al. Automated Machine Learning: State-of-The-Art and Open Challenges , 2019, ArXiv.
[477] David Bawden,et al. The dark side of information: overload, anxiety and other paradoxes and pathologies , 2009, J. Inf. Sci..
[478] Tanel Alumäe,et al. LSTM for punctuation restoration in speech transcripts , 2015, INTERSPEECH.
[479] Wassnaa Al-Mawee,et al. Privacy and Security Issues in IoT Healthcare Applications for the Disabled Users a Survey , 2012 .
[480] Peter Kroes,et al. The dual nature of technical artefacts , 2006 .
[481] Touradj Ebrahimi,et al. Using warping for privacy protection in video surveillance , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).
[482] Sue Holwell,et al. Information, Systems and Information Systems: Making Sense of the Field , 1998 .
[483] Irene Lill,et al. A Framework for Managing Post-disaster Housing Reconstruction☆ , 2015 .
[484] Nava Tintarev,et al. Introduction to the Special Issue on Human Interaction with Artificial Advice Givers , 2016, ACM Trans. Interact. Intell. Syst..
[485] Niels Martin,et al. The Use of Process Mining in Business Process Simulation Model Construction , 2016, Bus. Inf. Syst. Eng..
[486] Alan R. Hevner,et al. Utilizing, Producing, and Contributing Design Knowledge in DSR Projects , 2018, DESRIST.
[487] Arie van Deursen,et al. Pragmatic Software Testing Education , 2019, SIGCSE.
[488] Dahui Li,et al. Task Design, Motivation, and Participation in Crowdsourcing Contests , 2011, Int. J. Electron. Commer..
[489] David R. Thomas,et al. A General Inductive Approach for Analyzing Qualitative Evaluation Data , 2006 .
[490] Ahmed Awad,et al. RBPSim: A Resource-aware Extension of BPSim Using Workflow Resource Patterns , 2018, ZEUS.
[491] Mathias Weske,et al. Design of an Extensible BPMN Process Simulator , 2017, Business Process Management Workshops.
[492] Richard Baskerville,et al. Distinctions Among Different Types of Generalizing in Information Systems Research , 1999, New Information Technologies in Organizational Processes.
[493] Nyi Nyi Htun,et al. ContextPlay: Evaluating User Control for Context-Aware Music Recommendation , 2019, UMAP.
[494] Vishanth Weerakkody,et al. A framework for analysing blockchain technology adoption: Integrating institutional, market and technical factors , 2020, Int. J. Inf. Manag..
[495] Aparna Gupta,et al. Impact of compensation structure and managerial incentives on bank risk taking , 2015, Eur. J. Oper. Res..
[496] Abdulmotaleb El-Saddik,et al. Survey on ontologies for affective states and their influences , 2018, Semantic Web.
[497] Yiming Yang,et al. XLNet: Generalized Autoregressive Pretraining for Language Understanding , 2019, NeurIPS.
[498] Jens Bürger,et al. Restoring security of evolving software models using graph transformation , 2014, International Journal on Software Tools for Technology Transfer.
[499] Christophe Labreuche,et al. Use of a multi-criteria decision support tool to prioritize reconstruction projects in a post-disaster phase , 2015, 2015 2nd International Conference on Information and Communication Technologies for Disaster Management (ICT-DM).
[500] Casper Boks,et al. User‐centred design for sustainable behaviour , 2008 .
[501] Laurian M. Chirica,et al. The entity-relationship model: toward a unified view of data , 1975, SIGF.
[502] Weijia Jia,et al. Influence analysis in social networks: A survey , 2018, J. Netw. Comput. Appl..
[503] Matteo Golfarelli,et al. QETL: An approach to on-demand ETL from non-owned data sources , 2017, Data Knowl. Eng..
[504] Inigo Martinez de Rituerto de Troya,et al. Predicting , explaining , and understanding risk of long-term unemployment , 2018 .
[505] Timo Kehrer,et al. Henshin: A Usability-Focused Framework for EMF Model Transformation Development , 2017, ICGT.
[506] Ilia Bider,et al. Using Fractal Enterprise Model to Assist Complexity Management , 2018, BIR Workshops.
[507] Göran Goldkuhl,et al. A Multi-Grounded Design Research Process , 2010, DESRIST.
[508] Shikha Agrawal,et al. Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.
[509] Judith Masthoff,et al. Explaining Recommendations: Design and Evaluation , 2015, Recommender Systems Handbook.
[510] Sander J. J. Leemans,et al. Discovering Block-Structured Process Models from Event Logs - A Constructive Approach , 2013, Petri Nets.
[511] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[512] Yannis Charalabidis,et al. A Review of Opinion Mining Methods for Analyzing Citizens' Contributions in Public Policy Debate , 2011, ePart.
[513] Asunción Gómez-Pérez,et al. A Double Classification of Common Pitfalls in Ontologies , 2010 .
[514] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[515] James Hartley,et al. Is it appropriate to use structured abstracts in social science journals? , 1997, Learn. Publ..
[516] Rosalind W. Picard. Affective computing: challenges , 2003, Int. J. Hum. Comput. Stud..
[517] Harry Matlay,et al. "Blanket" approaches to promoting ICT in small firms: some lessons from the DTI ladder adoption model in the UK , 2001, Internet Res..
[518] Raian Ali,et al. Online Peer Support Groups to Combat Digital Addiction: User Acceptance and Rejection Factors , 2019, WorldCIST.
[519] Laurence Alpay,et al. An empowerment-based approach to developing innovative e-health tools for self-management , 2010, Health Informatics J..
[520] Ilia Bider,et al. Linking Autopoiesis to Homeostasis in Socio-Technical Systems , 2019, STPIS@ECIS.
[521] Shiliang Sun,et al. Network-Scale Traffic Modeling and Forecasting with Graphical Lasso and Neural Networks , 2012, ArXiv.
[522] Colette Rolland,et al. A Multi-Model View of Process Modelling , 1999, Requirements Engineering.
[523] Monique Snoeck,et al. Assessing the effectiveness of feedback enabled simulation in teaching conceptual modeling , 2014, Comput. Educ..
[524] Xavier Franch,et al. Towards Integrating Data-Driven Requirements Engineering into the Software Development Process: A Vision Paper , 2020, REFSQ.
[525] Matteo Golfarelli,et al. Schema profiling of document-oriented databases , 2018, Inf. Syst..
[526] Hajo A. Reijers,et al. An Approach for the Automated Generation of Engaging Dashboards , 2019, OTM Conferences.
[527] Liz Bayley,et al. The Structured Abstract: An Essential Tool for Researchers , 2003 .
[528] Rob Fergus,et al. Visualizing and Understanding Convolutional Networks , 2013, ECCV.
[529] Atif M. Memon,et al. GUITAR: an innovative tool for automated testing of GUI-driven software , 2014, Automated Software Engineering.
[530] Richard T. Watson,et al. Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..
[531] Roel Wieringa,et al. Six strategies for generalizing software engineering theories , 2015, Sci. Comput. Program..
[532] Haralambos Mouratidis,et al. DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance , 2019, TrustBus.
[533] Bhumika Gupta,et al. Analysis of Various Decision Tree Algorithms for Classification in Data Mining , 2017 .
[534] Cyrus Shahabi,et al. An entropy-based framework for efficient post-disaster assessment based on crowdsourced data , 2016, EM-GIS.
[535] Olly Gotel,et al. Teaching software quality assurance by encouraging student contributions to an open source web-based system for the assessment of programming assignments , 2008, ITiCSE.
[536] Alexander Gluhak,et al. A survey on facilities for experimental internet of things research , 2011, IEEE Communications Magazine.
[537] Xinpeng Zhang,et al. An efficient privacy protection scheme for data security in video surveillance , 2019, J. Vis. Commun. Image Represent..
[538] B. LeBaron. Agent-based Computational Finance , 2006 .
[539] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[540] T. J. Hunt,et al. Leader-member exchange relationships in health information management. , 2014, Perspectives in health information management.
[541] Jianhua Tao,et al. Self-attention Based Model for Punctuation Prediction Using Word and Speech Embeddings , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[542] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[543] Islam H. El-adaway,et al. Decision-Making Framework for Holistic Sustainable Disaster Recovery: Agent-Based Approach for Decreasing Vulnerabilities of the Associated Communities , 2018, Journal of Infrastructure Systems.
[544] Tanja E. J. Vos,et al. Q-learning strategies for action selection in the TESTAR automated testing tool , 2016 .
[545] Miguel Toro,et al. Visual ppinot: A Graphical Notation for Process Performance Indicators , 2019, Bus. Inf. Syst. Eng..
[546] John Mylopoulos,et al. Towards an Ontology for Privacy Requirements via a Systematic Literature Review , 2017, ER.
[547] Stephanie Boehm,et al. Information Dashboard Design The Effective Visual Communication Of Data , 2016 .
[548] Max Chevalier,et al. Document-oriented Models for Data Warehouses - NoSQL Document-oriented for Data Warehouses , 2016, ICEIS.
[549] Lawrence Joseph,et al. The Sustainability of a Workplace Wellness Program That Incorporates Gamification Principles: Participant Engagement and Health Benefits After 2 Years , 2019, American journal of health promotion : AJHP.
[550] G. Henriques,et al. Psychology defined. , 2004, Journal of clinical psychology.
[551] Gerard Briscoe,et al. Digital Innovation: The Hackathon Phenomenon , 2014 .
[552] Johannes De Smedt,et al. Developing a Modelling and Mining Framework for Integrated Processes and Decisions , 2017, OTM Workshops.
[553] Jens Bürger,et al. Versioning and Evolution Requirements for Model-Based System Development , 2014, Softwaretechnik-Trends.
[554] George Drosatos,et al. Blockchain Applications in the Biomedical Domain: A Scoping Review , 2019, Computational and structural biotechnology journal.
[555] Mumbai,et al. Internet of Things (IoT): A Literature Review , 2015 .
[556] Udo Kelter,et al. A rule-based approach to the semantic lifting of model differences in the context of model versioning , 2011, 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011).
[557] Patrick Delfmann,et al. A Tool for Decision Logic Verification in DMN Decision Tables , 2019, BPM.
[558] Rim Djedidi,et al. Ontology Change Management , 2009, I-SEMANTICS.
[559] A. Onwuegbuzie,et al. Toward a Definition of Mixed Methods Research , 2007 .
[560] R. Graham,et al. Spearman's Footrule as a Measure of Disarray , 1977 .
[561] Tanja E. J. Vos,et al. Automated Localisation Testing in Industry with Test ^* ∗ , 2016, ICTSS.
[562] Joos Vandewalle,et al. A Multilinear Singular Value Decomposition , 2000, SIAM J. Matrix Anal. Appl..
[563] Alessandro Berti,et al. Process Mining for Python (PM4Py): Bridging the Gap Between Process- and Data Science , 2019, ArXiv.
[564] Gianna Reggio,et al. Consistency Problems in UML-Based Software Development , 2004, UML Satellite Activities.
[565] Alexander M. Rush,et al. LSTMVis: A Tool for Visual Analysis of Hidden State Dynamics in Recurrent Neural Networks , 2016, IEEE Transactions on Visualization and Computer Graphics.
[566] Tanja E. J. Vos,et al. Scriptless Testing at the GUI Level in an Industrial Setting , 2020, RCIS.
[567] Nicolas Mayer,et al. Model-based Management of Information System Security Risk , 2012 .
[568] Alessandro Vinciarelli,et al. A Survey of Personality Computing , 2014, IEEE Transactions on Affective Computing.
[569] Panos Kalnis,et al. On the Anonymization of Sparse High-Dimensional Data , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[570] Cynthia Mathis Beath,et al. Designed for Digital: How to Architect Your Business for Sustained Success , 2019 .
[571] Elena Lloret,et al. Text summarisation in progress: a literature review , 2011, Artificial Intelligence Review.
[572] César A. Hidalgo,et al. Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.
[573] José F. Ruiz,et al. Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform , 2016, 2016 IEEE 24th International Requirements Engineering Conference (RE).
[574] Christoph Augenstein,et al. Anomaly Detection on Data Streams - A LSTM's Diary , 2020, RCIS.
[575] Boudewijn F. van Dongen,et al. Replaying history on process models for conformance checking and performance analysis , 2012, WIREs Data Mining Knowl. Discov..
[576] Sigrid Eldh,et al. Towards a Test Automation Improvement Model (TAIM) , 2014, 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops.
[577] Sandeep Purao,et al. Design Research in the Technology of Information Systems: Truth or Dare , 2002 .
[578] Uma Rani,et al. Understanding unemployment flows , 2011 .
[579] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[580] Anthony Simonofski,et al. The Impact of Impediments on Open Government Data Use: Insights from Users , 2019, 2019 13th International Conference on Research Challenges in Information Science (RCIS).
[581] Mehrdad Sabetzadeh,et al. The Case for Context-Driven Software Engineering Research: Generalizability Is Overrated , 2017, IEEE Softw..
[582] Rolf Niedermeier,et al. Fixed-parameter algorithms for Kemeny rankings , 2009, Theor. Comput. Sci..
[583] Björn Niehaves,et al. Reconstructing the giant: On the importance of rigour in documenting the literature search process , 2009, ECIS.
[584] Abdallah Arioua,et al. Explanatory dialogues with argumentative faculties over inconsistent knowledge bases , 2017, Expert Syst. Appl..
[585] Monique Snoeck,et al. Hearing the Voice of Citizens in Smart City Design: The CitiVoice Framework , 2018, Business & Information Systems Engineering.
[586] Mark Guzdial,et al. Introducing testing practices into objects and design course , 2003, Proceedings 16th Conference on Software Engineering Education and Training, 2003. (CSEE&T 2003)..
[587] Franck Berthelon,et al. Emotion ontology for context awareness , 2013, 2013 IEEE 4th International Conference on Cognitive Infocommunications (CogInfoCom).
[588] Isabelle Mirbel,et al. Situational method engineering: combining assembly-based and roadmap-driven approaches , 2005, Requirements Engineering.
[589] Thomas Bäck,et al. Anomaly Detection in Univariate Time Series: An Empirical Comparison of Machine Learning Algorithms , 2019, ICDM.
[590] Marlon Dumas,et al. Lightning Fast Business Process Simulator , 2011 .
[591] Praneeth Babu Marella,et al. Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology , 2018 .
[592] Paolo Tonella,et al. Capture-replay vs. programmable web testing: An empirical assessment during test case evolution , 2013, 2013 20th Working Conference on Reverse Engineering (WCRE).
[593] Camille Salinesi,et al. A Requirement-driven Approach for Designing Data Warehouses , 2006 .
[594] Krsto Pandza,et al. Management as Design, But What Kind of Design? An Appraisal of the Design Science Analogy for Management , 2010 .
[595] Reiko Heckel,et al. Automatic Inference of Rule-Based Specifications of Complex In-place Model Transformations , 2017, ICMT.
[596] Paulo Cortez,et al. A deep learning classifier for sentence classification in biomedical and computer science abstracts , 2019, Neural Computing and Applications.
[597] Alexander M. Rush,et al. Bottom-Up Abstractive Summarization , 2018, EMNLP.
[598] S. Probert. Introduction to Systems Theory , 2013 .
[599] David Alexander. "From Rubble to Monument" Revisited : Modernised Perspectives on Recovery from Disaster , 2007 .
[600] James Hartley,et al. Obtaining information accurately and quickly: are structured abstracts more efficient? , 1996, J. Inf. Sci..
[601] Marijn Janssen,et al. Citizens' Motivations for Engaging in Open Data Hackathons , 2019, ePart.
[602] Bran Selic,et al. The Pragmatics of Model-Driven Development , 2003, IEEE Softw..
[603] Arnaldo de Albuquerque Araújo,et al. VSUMM: A mechanism designed to produce static video summaries and a novel evaluation method , 2011, Pattern Recognit. Lett..
[604] Stefanos Gritzalis,et al. Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.
[605] Jeffrey Pennington,et al. GloVe: Global Vectors for Word Representation , 2014, EMNLP.
[606] Lars Elleström,et al. Media Transformation: The Transfer of Media Characteristics among Media , 2014 .
[607] Yoshua Bengio,et al. A Neural Probabilistic Language Model , 2003, J. Mach. Learn. Res..
[608] Bruce A. Draper,et al. Looking Under the Hood: Visualizing What LSTMs Learn , 2019, ICIAR.
[609] B. Kitchenham,et al. Case Studies for Method and Tool Evaluation , 1995, IEEE Softw..
[610] Michael Gibbs,et al. TESTING TOURNAMENTS ? AN APPRAISAL OF THE THEORY AND EVIDENCE , 2001 .
[611] Luke S. Zettlemoyer,et al. Deep Contextualized Word Representations , 2018, NAACL.
[612] Paul Clements,et al. ATAM: Method for Architecture Evaluation , 2000 .
[613] Syed Muhammad Anwar,et al. Generation of personalized video summaries by detecting viewer's emotion using electroencephalography , 2019, J. Vis. Commun. Image Represent..
[614] Mark Schafer,et al. Antecedents of Groupthink , 1996 .
[615] Salvatore T. March,et al. Design and natural science research on information technology , 1995, Decis. Support Syst..
[616] Chia-han Lee,et al. On-Line Multi-View Video Summarization for Wireless Video Sensor Network , 2015, IEEE Journal of Selected Topics in Signal Processing.
[617] Jun Tang,et al. Developing an intelligent data discriminating system of anti-money laundering based on SVM , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[618] Monique Snoeck,et al. Enterprise Information Systems Engineering : The MERODE Approach , 2014 .
[619] Tomas Mikolov,et al. Enriching Word Vectors with Subword Information , 2016, TACL.
[620] Alan R. Hevner,et al. Exploring the Relationship between Design Science Research and Innovation: A Case Study of Innovation at Chevron , 2011 .
[621] Robert Cooper,et al. Modernism, Post Modernism and Organizational Analysis 3: The Contribution of Jacques Derrida , 1989 .
[622] Kevin Gimpel,et al. Pushing the Limits of Paraphrastic Sentence Embeddings with Millions of Machine Translations , 2017, ArXiv.
[623] Ilia Bider,et al. Defining Transformational Patterns for Business Model Innovation , 2018, BIR.
[624] Ali H. Mirza,et al. Computer network intrusion detection using sequential LSTM Neural Networks autoencoders , 2018, 2018 26th Signal Processing and Communications Applications Conference (SIU).
[625] Slim Abdennadher,et al. Character computing: challenges and opportunities , 2017, MUM.
[626] Andrew Georgiou,et al. Consumer E-Health: An Overview of Research Evidence and Implications for Future Policy , 2011, Health information management : journal of the Health Information Management Association of Australia.
[627] Tanja E. J. Vos,et al. Aplib: Tactical Agents for Testing Computer Games , 2020, EMAS@AAMAS.
[628] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[629] Cirano Iochpe,et al. An Incremental Process Mining Approach to Extract Knowledge from Legacy Systems , 2010, 2010 14th IEEE International Enterprise Distributed Object Computing Conference.
[630] Roland Bader,et al. Designing an Explanation Interface for Proactive Recommendations in Automotive Scenarios , 2011, UMAP Workshops.
[631] Dietmar Jannach,et al. A systematic review and taxonomy of explanations in decision support and recommender systems , 2017, User Modeling and User-Adapted Interaction.
[632] Tanel Alumäe,et al. Bidirectional Recurrent Neural Network with Attention Mechanism for Punctuation Restoration , 2016, INTERSPEECH.
[633] Dhananjay Kumar,et al. An efficient system for anomaly detection using deep learning classifier , 2017, Signal Image Video Process..
[634] Elena Kornyshova,et al. Decision-making method family MADISE: Validation within the requirements engineering domain , 2012, 2012 Sixth International Conference on Research Challenges in Information Science (RCIS).
[635] Jun Zhao,et al. 'It's Reducing a Human Being to a Percentage': Perceptions of Justice in Algorithmic Decisions , 2018, CHI.
[636] A. S. Roa,et al. AgentSpeak(L): BDI agents speak out in a logical computable language , 1996 .
[637] Maher Alharby,et al. Blockchain-based Smart Contracts: A Systematic Mapping Study , 2017, ICAISC 2017.
[638] Marten Schönherr,et al. Artifact Types in Information Systems Design Science - A Literature Review , 2010, DESRIST.
[639] Alan R. Hevner,et al. Design Science in Information Systems Research , 2004, MIS Q..
[640] Tanja E. J. Vos,et al. Evaluating rogue user testing in industry: An experience report , 2014, 2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS).
[641] Raian Ali,et al. Explainable Recommendations in Intelligent Systems: Delivery Methods, Modalities and Risks , 2020, RCIS.
[642] Peter A. Flach,et al. Explainability fact sheets: a framework for systematic assessment of explainable approaches , 2019, FAT*.
[643] Marten van Sinderen,et al. Mapping the business model canvas to ArchiMate , 2012, SAC '12.
[644] Sharlene Hesse-Biber,et al. Handbook of emergent methods , 2008 .
[645] Mohsen Guizani,et al. MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain , 2017, IEEE Access.
[646] Benoît Depaire,et al. Retrieving the resource availability calendars of a process from an event log , 2020, Inf. Syst..
[647] Dario Colazzo,et al. Schema Inference for Massive JSON Datasets , 2017, EDBT.
[648] E. Lazear,et al. Rank-Order Tournaments as Optimum Labor Contracts , 1979, Journal of Political Economy.
[649] Alexander Maedche,et al. Configurations of User Involvement and Participation in Relation to Information System Project Success , 2018, CAiSE.
[650] Alexandros André Chaaraoui,et al. Visual privacy protection methods: A survey , 2015, Expert Syst. Appl..
[651] W. Gregory Voss. European Union Data Privacy Law Reform: General Data Protection Regulation, Privacy Shield, and the Right to Delisting , 2017 .
[652] Yoshua Bengio,et al. Learning long-term dependencies with gradient descent is difficult , 1994, IEEE Trans. Neural Networks.
[653] Siobhán Clarke,et al. Middleware for Internet of Things: A Survey , 2016, IEEE Internet of Things Journal.
[654] Josep Domingo-Ferrer,et al. Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges , 2019, Comput. Commun..
[655] Tao Li,et al. Incremental Workflow Mining with Optional Patterns and Its Application to Production Printing Process , 2007 .
[656] Mirella Lapata,et al. Text Summarization with Pretrained Encoders , 2019, EMNLP.
[657] Chien-Hung Chen,et al. Domain Ontology As Conceptual Model for Big Data Management: Application in Biomedical Informatics , 2014, ER.
[658] Guy Doumeingts,et al. GRAI Grid Decisional Modelling , 1998 .
[659] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[660] Jeffrey O. Kephart,et al. The Vision of Autonomic Computing , 2003, Computer.
[661] Peter M. Kruse,et al. Development and maintenance efforts testing graphical user interfaces: a comparison , 2016, A-TEST@SIGSOFT FSE.
[662] Alexandra Martínez,et al. Use of JiTT in a Graduate Software Testing Course: An Experience Report , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET).
[663] Imed Romdhani,et al. Architecting the Internet of Things: State of the Art , 2016 .
[664] James J. Heckman,et al. New Methods for Analyzing Individual Event Histories , 1982 .
[665] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[666] Jean Scholtz,et al. How do visual explanations foster end users' appropriate trust in machine learning? , 2020, IUI.
[667] Sooyong Park,et al. A Reference Model for Big Data Analytics , 2018, 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).
[668] Bilal Khan,et al. Effectiveness of information security awareness methods based on psychological theories , 2011 .
[669] Wil M. P. van der Aalst,et al. Ensuring Confidentiality in Process Mining , 2018, SIMPDA.
[670] Slim Abdennadher,et al. Applications of Character Computing From Psychology to Computer Science , 2020 .
[671] Jonathan Eldredge,et al. Evidence-based librarianship: the EBL process , 2006, Libr. Hi Tech.
[672] Konstantinos Kalpakis,et al. Adaptive Methods for Activity Monitoring of Streaming Data , 2002, ICMLA.
[673] Mikko Peltola,et al. Työmarkkinasiirtymät Suomessa: Työllisyyden päättymisen jälkeinen työmarkkinasiirtymien dynamiikka vuosina 1995–1999 , 2004 .
[674] Heinrich Hußmann,et al. The Impact of Placebic Explanations on Trust in Intelligent Systems , 2019, CHI Extended Abstracts.
[675] Jean Carletta,et al. The AMI Meeting Corpus: A Pre-announcement , 2005, MLMI.
[676] Stefano Borgo,et al. Foundational Choices in DOLCE , 2009, Handbook on Ontologies.
[677] Fabian Prasser,et al. Putting Statistical Disclosure Control into Practice: The ARX Data Anonymization Tool , 2015, Medical Data Privacy Handbook.
[678] Kai Fan,et al. MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain , 2018, Journal of Medical Systems.
[679] Stephen Smith,et al. Emerald 110k: A Multidisciplinary Dataset for Abstract Sentence Classification , 2019, ALTA.
[680] Virve Ollikainen,et al. The Determinants of Unemployment Duration by Gender in Finland , 2003 .
[681] Tanja E. J. Vos,et al. Evaluating the TESTAR tool in an industrial case study , 2014, ESEM '14.
[682] Per Runeson,et al. Guidelines for conducting and reporting case study research in software engineering , 2009, Empirical Software Engineering.
[683] Wil M. P. van der Aalst,et al. Workflow Resource Patterns: Identification, Representation and Tool Support , 2005, CAiSE.
[684] Stephen Platt,et al. Disaster Recovery Indicators: guidelines for monitoring and evaluation , 2010 .
[685] Lorrie Faith Cranor,et al. Security and Usability: Designing Secure Systems that People Can Use , 2005 .
[686] Bruno Dumas,et al. Evoq: a Visualization Tool to Support Structural Analysis of Text Documents , 2018, DocEng.
[687] Fiaz Hussain,et al. Video Indexing: A Survey , 2014 .
[688] Olga De Troyer,et al. Ontology Change Detection Using a Version Log , 2005, SEMWEB.
[689] Dario Colazzo,et al. Parametric schema inference for massive JSON datasets , 2019, The VLDB Journal.
[690] Dongqing Xie,et al. Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges , 2017, IEEE Network.
[691] Boguslaw Cyganek. Hybrid ensemble of classifiers for logo and trademark symbols recognition , 2015, Soft Comput..
[692] Yann LeCun,et al. Learning a similarity metric discriminatively, with application to face verification , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[693] Frank Rudzicz,et al. A survey of word embeddings for clinical text , 2019, J. Biomed. Informatics X.
[694] Douglas C. Schmidt,et al. FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data , 2018, Computational and structural biotechnology journal.
[695] D. Lawrence,et al. Assurances and Machine Self-Confidence for Enhanced Trust in Autonomous Systems , 2016 .
[696] Dirk Fahland,et al. Model repair - aligning process models to reality , 2015, Inf. Syst..
[697] Ravikiran Vatrapu,et al. BPDIMS: A Blockchain-based Personal Data and Identity Management System , 2019, HICSS.
[698] Ana Alice Baptista,et al. Interfaces for Science: Conceptualizing an Interactive Graphical Interface , 2018, ArtsIT/DLI.
[699] Dade Nurjanah,et al. LifeOn, a ubiquitous lifelong learner model ontology supporting adaptive learning , 2018, 2018 IEEE Global Engineering Education Conference (EDUCON).
[700] Duane T. Wegener,et al. Attitudes and attitude change. , 1997, Annual review of psychology.
[701] César A. Collazos,et al. EmotionsOnto: an Ontology for Developing Affective Applications , 2014, J. Univers. Comput. Sci..
[702] Alex Bassi,et al. IoT Challenges , 2012, Communications in Mobile Computing.
[703] Ian A. Kash,et al. Market manipulation with outside incentives , 2011, Autonomous Agents and Multi-Agent Systems.
[704] Melanie Swan,et al. Blockchain: Blueprint for a New Economy , 2015 .
[705] Alistair Cockburn,et al. Structuring Use Cases with Goals , 2000 .
[706] F. Grabowski,et al. Simple, complicated and complex systems — the brief introduction , 2008, 2008 Conference on Human System Interactions.
[707] J. Heckman,et al. Does Unemployment Cause Future Unemployment? Definitions, Questions and Answers from a Continuous Time Model of Heterogeneity and State Dependence. , 1980 .
[708] Jeasik Cho,et al. Validity in qualitative research revisited , 2006 .
[709] J. M. Eklund,et al. Blockchain Technology in Healthcare: A Systematic Review , 2019, Healthcare.
[710] Udo Kelter,et al. Adaptability of model comparison tools , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.
[711] Keng Siau,et al. Identifying Difficulties in Learning Uml , 2006, Inf. Syst. Manag..
[712] J. Galán-Mena,et al. Creating an Ontological Networks to Support the Inference of Personality Traits and Facets , 2018, 2018 IEEE XXV International Conference on Electronics, Electrical Engineering and Computing (INTERCON).
[713] Monique Snoeck,et al. Enterprise Information Systems Engineering , 2014, The Enterprise Engineering Series.
[714] César A. Hidalgo,et al. Disconnected, fragmented, or united? a trans-disciplinary review of network science , 2015, Appl. Netw. Sci..
[715] Marta Indulska,et al. How good is BPMN really? Insights from theory and practice , 2006, ECIS.
[716] Jan Jürjens,et al. Secure systems development with UML , 2004 .
[717] Bowen Zhou,et al. Abstractive Text Summarization using Sequence-to-sequence RNNs and Beyond , 2016, CoNLL.
[718] Nancy Grudens-Schuck,et al. Methodology Brief: Can You Call It a Focus Group? , 2004 .
[719] Ronald L. Akers,et al. Rational Choice, Deterrence, and Social Learning Theory in Criminology: The Path Not Taken , 1990 .
[720] O. Robinson. Sampling in Interview-Based Qualitative Research: A Theoretical and Practical Guide , 2014 .
[721] Ben Shneiderman,et al. Analyzing Social Media Networks with NodeXL: Insights from a Connected World , 2010 .
[722] Rashmi Raj,et al. Web Spam Detection with Anti-Trust Rank , 2006, AIRWeb.
[723] Besnik Selimi,et al. Systematic Literature Review of Blockchain Applications: Smart Contracts , 2019, 2019 International Conference on Information Technologies (InfoTech).
[724] Peter Brusilovsky,et al. Explaining Need-based Educational Recommendations Using Interactive Open Learner Models , 2019, UMAP.
[725] Bernhard Rumpe,et al. User-Centered and Privacy-Driven Process Mining System Design for IoT , 2019, CAiSE Forum.
[726] Cécile Manaouil. Le dossier médical personnel (DMP) : « autopsie » d’un projet ambitieux ? , 2009 .
[727] Nour Ali,et al. Self-adaptive quality requirement elicitation process for legacy systems: a case study in healthcare , 2017, SAC.
[728] K. Witte. Putting the fear back into fear appeals: The extended parallel process model , 1992 .
[729] J. Aken. Management Research as a Design Science: Articulating the Research Products of Mode 2 Knowledge Production in Management , 2005 .
[730] Anja Krajnc. Postavljanje vejic v slovenščini s pomočjo strojnega učenja , 2015 .
[731] Srinath Perera,et al. Big Data Analytics Platforms for Real-Time Applications in IoT , 2016 .
[732] Balbir S. Barn,et al. Human and Value Sensitive Aspects of Mobile App Design: A Foucauldian Perspective , 2018, CAiSE.
[733] Hermann Astleitner,et al. An Integrated Model of Multimedia Learning and Motivation , 2004 .
[734] Boris Motik,et al. Managing Multiple Ontologies and Ontology Evolution in Ontologging , 2002, Intelligent Information Processing.
[735] Bhavana Dalvi,et al. Pretrained Language Models for Sequential Sentence Classification , 2019, EMNLP/IJCNLP.
[736] Sander J. J. Leemans,et al. Discovering Block-Structured Process Models from Event Logs Containing Infrequent Behaviour , 2013, Business Process Management Workshops.
[737] Gökhan Tür,et al. Automatic detection of sentence boundaries and disfluencies based on recognized words , 1998, ICSLP.
[738] Matthias Weidlich,et al. PRETSA: Event Log Sanitization for Privacy-aware Process Discovery , 2019, 2019 International Conference on Process Mining (ICPM).
[739] Ana Alice Baptista,et al. Information visualization: Conceptualizing new paths for filtering and navigate in scientific knowledge objects , 2017, 2017 24º Encontro Português de Computação Gráfica e Interação (EPCGI).
[740] James D. Hamilton,et al. Heterogeneity and Unemployment Dynamics , 2016 .
[741] S. Fortunato,et al. Statistical physics of social dynamics , 2007, 0710.3256.
[742] Stefano Borgo,et al. Artefacts in Formal Ontology , 2009 .
[743] Gerald Kotonya,et al. Developing IoT applications: challenges and frameworks , 2017, IET Cyper-Phys. Syst.: Theory & Appl..
[744] Daniel L. Moody,et al. The method evaluation model: a theoretical model for validating information systems design methods , 2003, ECIS.
[745] P. S. Lewis,et al. Function approximation and time series prediction with neural networks , 1990, 1990 IJCNN International Joint Conference on Neural Networks.
[746] Juhani Iivari,et al. A Paradigmatic Analysis of Information Systems As a Design Science , 2007, Scand. J. Inf. Syst..
[747] Ian Horrocks,et al. Handbook of Knowledge Representation Edited Description Logics 3.1 Introduction , 2022 .
[748] Ilia Bider,et al. Using Structural Coupling Approach for Defining and Maintaining Identity of an Educational Institution. Experience Report , 2018, STPIS@CAiSE.