default search action
Enterprise Information Systems, Volume 5
Volume 5, Number 1, 2011
- Marten van Sinderen, João Paulo A. Almeida:
Empowering enterprises through next-generation enterprise computing. 1-8
- Wilco Engelsman, Dick A. C. Quartel, Henk Jonkers, Marten van Sinderen:
Extending enterprise architecture modelling with business goals and requirements. 9-36 - Per Närman, Hannes Holm, Pontus Johnson, Johan König, Moustafa Chenine, Mathias Ekstedt:
Data accuracy assessment using enterprise architecture. 37-58 - Ralph Mietzner, Frank Leymann, Tobias Unger:
Horizontal and vertical combination of multi-tenancy patterns in service-oriented applications. 59-77 - Branimir Wetzstein, Philipp Leitner, Florian Rosenberg, Schahram Dustdar, Frank Leymann:
Identifying influential factors of business process performance using dependency analysis. 79-98 - Sebastien Vaucouleur:
Code query by example. 99-123 - Bryce Day, Christof Lutteroth:
Climbing the ladder: capability maturity model integration level 3. 125-144 - Guido Governatori, Renato Iannella:
A modelling and reasoning framework for social networks policies. 145-167
Volume 5, Number 2, 2011
- Lian Duan, W. Nick Street, E. Xu:
Healthcare information systems: data mining methods in the creation of a clinical recommender system. 169-181 - Nan Niu, Mingzhou Jin, Jing-Ru C. Cheng:
A case study of exploiting enterprise resource planning requirements. 183-206 - Xiongfei Cao, Feng Yang:
Measuring the performance of Internet companies using a two-stage data envelopment analysis model. 207-217 - David Ming-Huang Chiang, Chia-Ping Lin, Mu-Chen Chen:
The adaptive approach for storage assignment by mining data of warehouse management system for distribution centres. 219-234 - Sameer Kumar, Brooke B. Kadow, Melissa K. Lamkin:
Challenges with the introduction of radio-frequency identification systems into a manufacturer's supply chain - a pilot study. 235-253 - Peggy E. Chaudhry, Sohail S. Chaudhry, Stephen A. Stumpf, Hasshi Sudler:
Piracy in cyber space: consumer complicity, pirates and enterprise enforcement. 255-271
Volume 5, Number 3, 2011
- Xiangxian Chen, Yulin He, Hai Huang:
An approach to automatic development of interlocking logic based on Statechart. 273-286 - Yue-Hong Yin, J. Y. Xie:
Reconfigurable manufacturing execution system for pipe cutting. 287-299 - Ricardo Pérez-Castillo, Barbara Weber, Jakob Pinggera, Stefan Zugal, Ignacio García Rodríguez de Guzmán, Mario Piattini:
Generating event logs from non-process-aware systems enabling business process mining. 301-335 - Yi Zhang, Zongbin Li, Lida Xu, Jikong Wang:
A new method for automatic synthesis of tolerances for complex assemblies based on polychromatic sets. 337-358 - Laden Aldin, Sergio de Cesare:
A literature review on business process modelling: new frontiers of reusability. 359-383 - Eric Xu, Marek Wermus, Deborah Blythe Bauman:
Development of an integrated medical supply information system. 385-399
Volume 5, Number 4, 2011
- Milan Zdravkovic, Hervé Panetto, Miroslav Trajanovic, Alexis Aubry:
An approach for formalising the supply chain operations. 401-421 - Jinping Ma, Kanliang Wang, Lida Xu:
Modelling and analysis of workflow for lean supply chains. 423-447 - Yuyue Du, Liang Qi, MengChu Zhou:
A vector matching method for analysing logic Petri nets. 449-468 - Yuan Sun, Anol Bhattacherjee:
Multi-level analysis in information systems research: the case of enterprise resource planning system usage in China. 469-494 - Chuan Fu, Guoqing Zhang, Jing Yang, Xiaona Liu:
Study on the contract characteristics of Internet architecture. 495-513
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.