default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2018
- Abdullah Algashami, Sainabou Cham, Laura Vuillier, Angelos Stefanidis, Keith Phalp, Raian Ali:
Conceptualising Gamification Risks to Teamwork within Enterprise. PoEM 2018: 105-120 - Afef Awadid, Dominik Bork, Selmin Nurcan:
Towards Assessing the Multi-view Modeling Capability of Enterprise Modeling Methods. PoEM 2018: 351-361 - Saimir Bala, Jan Mendling, Martin Schimak, Peter Queteschiner:
Case and Activity Identification for Mining Process Models from Middleware. PoEM 2018: 86-102 - Daria Bogdanova, Monique Snoeck:
Learning from Errors: Error-based Exercises in Domain Modelling Pedagogy. PoEM 2018: 321-334 - Dominik Bork:
Metamodel-Based Analysis of Domain-Specific Conceptual Modeling Methods. PoEM 2018: 172-187 - Mohammad Hossein Danesh, Eric S. K. Yu:
Towards a Framework for Shaping & Forming Enterprise Capabilities. PoEM 2018: 188-202 - Galina Deeva, Monique Snoeck, Jochen De Weerdt:
Discovering the Impact of Students' Modeling Behavior on their Final Performance. PoEM 2018: 335-350 - Jonnro Erasmus, Irene Vanderfeesten, Konstantinos Traganos, Xavier Jie-A.-Looi, Ad Kleingeld, Paul Grefen:
A Method to Enable Ability-Based Human Resource Allocation in Business Process Management Systems. PoEM 2018: 37-52 - Amjad Fayoumi:
Toward an Adaptive Enterprise Modelling Platform. PoEM 2018: 362-371 - Christian Fischer-Pauzenberger, Walter S. A. Schwaiger:
OntoREA© Accounting and Finance Model: Hedge Portfolio Representation of Derivatives. PoEM 2018: 372-382 - Domonkos Gaspar:
Organizational Value Creation by IT in Industry 4.0. PoEM 2018: 274-287 - Bas van Gils, Henderik A. Proper:
Enterprise Modelling in the Age of Digital Transformation. PoEM 2018: 257-273 - Jens Gulden, Eric S. K. Yu:
Toward Requirements-Driven Design of Visual Modeling Languages. PoEM 2018: 21-36 - Thomas Köhler, Steven Alter, Brian H. Cameron:
Enterprise Modeling at the Work System Level: Evidence from Four Cases at DHL Express Europe. PoEM 2018: 303-318 - Jörg Landthaler, Ömer Uludag, Gloria Bondel, Ahmed Elnaggar, Saasha Nair, Florian Matthes:
A Machine Learning Based Approach to Application Landscape Documentation. PoEM 2018: 71-85 - Birger Lantow:
Adaptive Case Management - A Review of Method Support. PoEM 2018: 157-171 - Emanuele Laurenzi, Knut Hinkelmann, Alta van der Merwe:
An Agile and Ontology-Aided Modeling Environment. PoEM 2018: 221-237 - Chiara Muzi, Luise Pufahl, Lorenzo Rossi, Mathias Weske, Francesco Tiezzi:
Formalising BPMN Service Interaction Patterns. PoEM 2018: 3-20 - Vik Pant, Eric S. K. Yu:
Conceptual Modeling to Support the "Larger Goal" Pivot - An Example from Netflix. PoEM 2018: 394-403 - Carme Quer, Xavier Franch, Cristina Palomares, Andreas A. Falkner, Alexander Felfernig, Davide Fucci, Walid Maalej, Jennifer Nerlich, Mikko Raatikainen, Gottfried Schenner, Martin Stettinger, Juha Tiihonen:
Reconciling Practice and Rigour in Ontology-Based Heterogeneous Information Systems Construction. PoEM 2018: 205-220 - Achim Reiz, Kurt Sandkuhl, Alexander V. Smirnov, Nikolay Shilov:
Grass-Root Enterprise Modeling: Issues and Potentials of Retrieving Models from Powerpoint. PoEM 2018: 55-70 - Marco Robol, Elda Paja, Mattia Salnitri, Paolo Giorgini:
Modeling and Reasoning About Privacy-Consent Requirements. PoEM 2018: 238-254 - Suman Roychoudhury, Sagar Sunkle, Namrata Choudhary, Deepali Kholkar, Vinay Kulkarni:
A Case Study on Modeling and Validating Financial Regulations Using (Semi-) Automated Compliance Framework. PoEM 2018: 288-302 - Junsup Song, Moonkun Lee:
A Composition Method to Model Collective Behavior. PoEM 2018: 121-137 - Debbie Tarenskeen, Stijn Hoppenbrouwers, Rogier van de Wetering:
Reflections on Using an Architecture Model for Matching Existing Applications to a Radical Business Requirements Change: A Case Study. PoEM 2018: 383-393 - Marné de Vries:
DEMO and the Story-Card Method: Requirements Elicitation for Agile Software Development at Scale. PoEM 2018: 138-153 - Robert Andrei Buchmann, Dimitris Karagiannis, Marite Kirikova:
The Practice of Enterprise Modeling - 11th IFIP WG 8.1. Working Conference, PoEM 2018, Vienna, Austria, October 31 - November 2, 2018, Proceedings. Lecture Notes in Business Information Processing 335, Springer 2018, ISBN 978-3-030-02301-0 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-13 16:42 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint