


default search action
15th RCIS 2021: Limassol, Cyprus
- Samira Si-Said Cherfi
, Anna Perini
, Selmin Nurcan
:
Research Challenges in Information Science - 15th International Conference, RCIS 2021, Limassol, Cyprus, May 11-14, 2021, Proceedings. Lecture Notes in Business Information Processing 415, Springer 2021, ISBN 978-3-030-75017-6
Business and Industrial Processes
- Judith Wewerka
, Manfred Reichert
:
Robotic Process Automation in the Automotive Industry - Lessons Learned from an Exploratory Case Study. 3-19 - Rébecca Deneckère, Elena Kornyshova, Charlotte Hug:
A Framework for Comparative Analysis of Intention Mining Approaches. 20-37 - Simone Agostinelli
, Andrea Marrella, Massimo Mecella:
Exploring the Challenge of Automated Segmentation in Robotic Process Automation. 38-54 - Veronika Plotnikova, Marlon Dumas
, Fredrik Milani
:
Adapting the CRISP-DM Data Mining Process: A Case Study in the Financial Services Domain. 55-71 - Diego Diaz, Mario Cortes Cornax
, Agnès Front, Cyril Labbé, David Faure:
A Method for Modeling Process Performance Indicators Variability Integrated to Customizable Processes Models. 72-87
Information Security and Risk Management
- Hegler Correa Tissot
:
Novel Perspectives and Applications of Knowledge Graph Embeddings: From Link Prediction to Risk Assessment and Explainability. 91-106 - Italo Jose da Silva Oliveira
, Mattia Fumagalli, Tiago Prince Sales
, Giancarlo Guizzardi:
How FAIR are Security Core Ontologies? A Systematic Mapping Study. 107-123 - Sanonda Datta Gupta, Aubree Nygaard, Stephen Kaplan, Vijayanta Jain, Sepideh Ghanavati
:
PHIN: A Privacy Protected Heterogeneous IoT Network. 124-141 - Vijayanta Jain, Sanonda Datta Gupta, Sepideh Ghanavati
, Sai Teja Peddinti:
PriGen: Towards Automated Translation of Android Applications' Code to Privacy Captions. 142-151 - Evangelia Vanezi, George Zampa, Christos Mettouris, Alexandros Yeratziotis, George A. Papadopoulos
:
CompLicy: Evaluating the GDPR Alignment of Privacy Policies - A Study on Web Platforms. 152-168
Data and Information Management
- Nanée Chahinian
, Thierry Bonnabaud La Bruyère, Francesca Frontini, Carole Delenne, Marin Julien, Rachel Panckhurst, Mathieu Roche, Lucile Sautot
, Laurent Deruelle, Maguelonne Teisseire:
WEIR-P: An Information Extraction Pipeline for the Wastewater Domain. 171-188 - Nils Finke, Marisa Mohr, Alexander Lontke, Marwin Züfle, Samuel Kounev, Ralf Möller:
Recommendations for Data-Driven Degradation Estimation with Case Studies from Manufacturing and Dry-Bulk Shipping. 189-204 - Hiba Abou Jamra
, Marinette Savonnet
, Éric Leclercq
:
Detection of Event Precursors in Social Networks: A Graphlet-Based Method. 205-220 - Silverio Martínez-Fernández
, Xavier Franch
, Andreas Jedlitschka
, Marc Oriol
, Adam Trendowicz:
Developing and Operating Artificial Intelligence Models in Trustworthy Autonomous Systems. 221-229 - Alaa Zreik, Zoubida Kedad:
Matching Conservation-Restoration Trajectories: An Ontology-Based Approach. 230-246
Domain Specific Information Systems Engineering
- Zakaria Maamar
, Mohamed Sellami, Fatma Masmoudi:
A Transactional Approach to Enforce Resource Availabilities: Application to the Cloud. 249-264 - Roberto Veloso, João Araújo
, Armanda Rodrigues
:
A WebGIS Interface Requirements Modeling Language. 265-273 - Ruba Al Khalaf
, Tommaso Alfonsi
, Stefano Ceri
, Anna Bernasconi
:
CoV2K: A Knowledge Base of SARS-CoV-2 Variant Impacts. 274-282 - Randa Ben Ammar, Yassine Ben Ayed:
A Language-Based Approach for Predicting Alzheimer Disease Severity. 283-294 - Mateja Nerima, Jolita Ralyté
:
Towards a Digital Maturity Balance Model for Public Organizations. 295-310
User-Centred Approaches
- Alia El Bolock
, Nada Elaraby, Cornelia Herbert, Slim Abdennadher:
CCOnto: The Character Computing Ontology. 313-329 - Tatsuki Ishikawa, Imen Ben Sassi
, Sadok Ben Yahia
:
Assessment of Malicious Tweets Impact on Stock Market Prices. 330-346 - Quim Motger
, Xavier Franch
, Jordi Marco
:
Integrating Adaptive Mechanisms into Mobile Applications Exploiting User Feedback. 347-355 - Konstantinos Tsilionis
, Joris Maene, Samedi Heng
, Yves Wautelet
, Stephan Poelmans:
Conceptual Modeling Versus User Story Mapping: Which is the Best Approach to Agile Requirements Engineering? 356-373 - Afef Walha, Faiza Ghozzi
, Faïez Gargouri
:
Design and Execution of ETL Process to Build Topic Dimension from User-Generated Content. 374-389
Data Science and Decision Support
- Benjamin Dalmas, Fabrice Baranski, Daniel Cortinovis:
Predicting Process Activities and Timestamps with Entity-Embeddings Neural Networks. 393-408 - Lhorie Pirnay
, Corentin Burnay:
Data-Driven Causalities for Strategy Maps. 409-417 - Olfa Slama, Patrice Darmon:
A Novel Personalized Preference-based Approach for Job/Candidate Recommendation. 418-434 - Chahinez Ounoughi, Amira Mouakher, Muhammad Ibraheem Sherzad, Sadok Ben Yahia
:
A Scalable Knowledge Graph Embedding Model for Next Point-of-Interest Recommendation in Tallinn City. 435-451 - Mohammed Lamine Bouchouia, Jean-Philippe Monteuuis, Ons Jelassi, Houda Labiod, Wafa Ben Jaballah, Jonathan Petit:
Spatial and Temporal Cross-Validation Approach for Misbehavior Detection in C-ITS. 452-468
Information Systems and Their Engineering
- Landy Andriamampianina
, Franck Ravat
, Jiefu Song
, Nathalie Vallès-Parlangeau
:
Towards an Efficient Approach to Manage Graph Data Evolution: Conceptual Modelling and Experimental Assessments. 471-488 - Reynald Eugenie, Erick Stattner:
DISDi: Discontinuous Intervals in Subgroup Discovery. 489-505 - Jeferson O. Batista, João Paulo A. Almeida, Eduardo Zambon, Giancarlo Guizzardi:
Building Correct Taxonomies with a Well-Founded Graph Grammar. 506-522 - Jean-Philippe Gouigoux, Dalila Tamzalit, Joost Noppen:
Microservice Maturity of Organizations - Towards an Assessment Framework. 523-540 - Nassira Achich
, Fatma Ghorbel, Fayçal Hamdi
, Elisabeth Métais, Faïez Gargouri
:
Dealing with Uncertain and Imprecise Time Intervals in OWL2: A Possibility Theory-Based Approach. 541-557
Poster and Demo
- Pierre Martin
, Thierry Helmer, Julien Rabatel
, Mathieu Roche
:
KEOPS: Knowledge ExtractOr Pipeline System. 561-567 - Jaroslav Knotek, Lukás Kolek, Petra Vysusilová, Julius Flimmel, Irena Holubová
:
Socneto: A Scent of Current Network Overview - (Demonstration Paper). 568-574 - Ilda Balliu, Harun Cerim, Mahran Emeiri, Kaan Yös, Irena Holubová
:
STOCK: A User-Friendly Stock Prediction and Sentiment Analysis System - (Demonstration Paper). 575-580 - Claudia-Melania Chituc:
Interoperability in the Footwear Manufacturing Networks and Enablers for Digital Transformation. 581-587 - Mahsa Pourbafrani
, Shuai Jiao, Wil M. P. van der Aalst
:
SIMPT: Process Improvement Using Interactive Simulation of Time-Aware Process Trees. 588-594 - Irina Marcenko, Anastasija Nikiforova
:
Digitalization in Sports to Connect Child's Sport Clubs, Parents and Kids: Simple Solution for Tackling Social and Psychological Issues. 595-601 - Abiola Paterne Chokki
, Anthony Simonofski
, Benoît Frénay
, Benoît Vanderose
:
Open Government Data for Non-expert Citizens: Understanding Content and Visualizations' Expectations. 602-608 - Mariana Bonito, João Araújo
, Armanda Rodrigues
:
Domain Analysis and Geographic Context of Historical Soundscapes: The Case of Évora. 609-615 - Chayma Sellami, Mickaël Baron, Mounir Bechchi, Allel Hadjali, Stéphane Jean, Dominique Chabot:
Towards a Unified Framework for Computational Trust and Reputation Models for e-Commerce Applications. 616-622 - Rediana Koçi
, Xavier Franch, Petar Jovanovic, Alberto Abelló:
Improving Web API Usage Logging. 623-629 - Nicolai Schützenmeier
, Stefan Jablonski, Stefan Schönig:
Towards a Hybrid Process Modeling Language. 630-636 - Nirmal Kumar Sivaraman, Vibhor Agarwal
, Yash Vekaria
, Sakthi Balan Muthiah
:
A Metadata-Based Event Detection Method Using Temporal Herding Factor and Social Synchrony on Twitter Data. 637-643 - Floris Emanuel
, Verónica Burriel
, Oscar Pastor
:
Data and Conceptual Model Synchronization in Data-Intensive Domains: The Human Genome Case. 644-650
Doctoral Consortium
- Aliyu Tanko Ali:
Simplified Timed Attack Trees. 653-660 - Benito Giunta
:
A Model-Driven Engineering Approach to Complex Performance Indicators: Towards Self-Service Performance Management (SS-PM). 661-669 - Andria Trigeorgi
:
Robust and Strongly Consistent Distributed Storage Systems. 670-679 - Samya Dhaiouir
:
The Impact and Potential of Using Blockchain Enabled Smart Contracts in the Supply Chain Application Area. 680-687

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.