Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Information Systems
Pergamon Press, Inc.
 
   
 
Options:
 
  1-10 of 104 reviews Date Reviewed 
  Dealing with change in process choreographies
Fdhila W., Indiono C., Rinderle-Ma S., Reichert M. Information Systems 49(C): 1-24, 2015.  Type: Article

Like many other fields, change propagation has been an active area of research in software engineering, particularly the analysis, evaluation, and propagation of changes in large, complex software systems. Authors in earlier works have...

Jul 1 2015
  Identification of ontologies to support information systems development
Beydoun G., Low G., García-Sánchez F., Valencia-García R., Martínez-Béjar R. Information Systems 4645-60, 2014.  Type: Article

Ontologies provide a domain-specific approach to formally name and define system types, properties, and entity interrelationships. Outside traditional semantic web ontological use, this paper shows how ontologies can be used to define ...

Apr 2 2015
  Modeling and execution of event stream processing in business processes
Appel S., Kleber P., Frischbier S., Freudenreich T., Buchmann A. Information Systems 46140-156, 2014.  Type: Article

In the world of emerging technologies and an ever-growing number of communication devices provided through the Internet of Things, along with ubiquitous and pervasive computing, the modern business world is faced with many challenges i...

Mar 25 2015
  Single-entry single-exit decomposed conformance checking
Munoz-Gama J., Carmona J., Van Der Aalst W. Information Systems 46102-122, 2014.  Type: Article

Complex systems are difficult to analyze due to unpredictable interactions among their parts. Thus, any technique that can help reduce this complexity is very welcome. One of the most effective ones is the time-honored divide et impera...

Mar 17 2015
  Simplifying process model abstraction: techniques for generating model names
Leopold H., Mendling J., Reijers H., La Rosa M. Information Systems 39134-151, 2014.  Type: Article

This paper addresses automatic analysis of the meaning of business process models, and is likely to be of interest to anyone who needs to extract meaning from the process models created by organizations to support quality assurance, ma...

Nov 5 2014
  CRISTAL: a practical study in designing systems to cope with change
Branson A., McClatchey R., Le Goff J., Shamdasani J. Information Systems 42139-152, 2014.  Type: Article

In classical software development, the transformation of design specifications into executable software requires a lot of effort and time and is not as agile as users typically want. This excellent paper builds on well-known principles...

Jul 16 2014
  Efficient tracking of moving objects using a relational database
Behrend A., Schüller G., Wieneke M. Information Systems 38(8): 1269-1284, 2013.  Type: Article

Classic algorithms for tracking uncooperative moving objects are often computationally expensive, even with the most powerful machines in the consumer market. The challenge comes from implementing the tracker’s calculation in...

Jan 13 2014
  On the definition and design-time analysis of process performance indicators
Del-RíO-Ortega A., Resinas M., Cabanillas C., Ruiz-CortéS A. Information Systems 38(4): 470-490, 2013.  Type: Article

Many (if not most) of us have only an intuitive but vague idea of what is meant by a process performance indicator (PPI). This paper is one of the few I have encountered that attempts, successfully, to provide a useful and rigorous spe...

Aug 13 2013
  Risk assessment in ERP projects
Aloini D., Dulmin R., Mininno V. Information Systems 37(3): 183-199, 2012.  Type: Article

The implementation of enterprise resource planning (ERP) is an intrinsically high-risk endeavor. Many critical business processes spanning several areas within an organization are drastically changed, requiring new capabilities, multip...

Jul 30 2012
  Approximate algorithms with generalizing attribute values for k-anonymity
Park H., Shim K. Information Systems 35(8): 933-955, 2010.  Type: Article

There are many occasions when datasets containing person-specific information have to be published or communicated to untrusted parties in order to support, for example, intended research studies. In all such cases, existing privacy la...

Jan 3 2011
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy