


default search action
Enterprise Information Systems, Volume 2
Volume 2, Number 1, 2008
- Lihong Liang

:
Earnings forecasts in enterprise information systems environment. 1-19 - G. A. Swanson:

Material flow, material information, and the analytics of integrative enterprise information systems. 21-31 - X. Gao, Z. Li, L. Li:

A process model for concurrent design in manufacturing enterprise information systems. 33-46 - Inka Vilpola:

A method for improving ERP implementation success by the principles and process of user-centred design. 47-76 - Annika Andersson, Henrik C. J. Linderoth:

Learn not to learn-a way of keeping budgets and deadlines in ERP projects? 77-95
Volume 2, Number 2, 2008
- Juan Carlos Augusto, Marc Roper:

Editorial. 97-99 - Oana Otilia Prisecaru:

Resource workflow nets: an approach to workflow modelling and analysis. 101-120 - Nasreddine Aoumeur:

Stepwise rigorous development of distributed agile information systems: from UML-diagrams to component-based Petri Nets. 121-156 - Viara Popova, Alexei Sharpanskykh:

Process-oriented organisation modelling and analysis. 157-176 - Srinivasan Ramaswamy, Remzi Seker, Sithu D. Sudarsan, Mhamed Itmi, Adnane Cabani

, Waled Alshabi:
Modelling and simulation: The basis for education enrichment and software design. 177-199 - Honggeng Zhou

, David A. Collier, Darryl D. Wilson:
The relationship of strategic business alignment and enterprise information management in achieving better business performance. 201-220
Volume 2, Number 3, 2008
- Tao Zhang, Shi Ying, Sheng Cao, Jiankeng Zhang:

A modelling approach to service-oriented architecture. 239-257 - Shancang Li

, Xinheng Wang
, Deyun Zhang:
Node localisation in wireless sensor network based on self-organising isometric embedding. 259-273 - Javier Santos

, Jose M. Sarriegi, Nicolás Serrano
:
A support methodology for EAI and BPM projects in SMEs. 275-286 - Weixiang Xu, L. Xu, Xumin Liu, James D. Jones:

A new approach to decision-making with key constraint and its application in enterprise information systems. 287-308 - Qiang Yan:

A security evaluation approach for information systems in telecommunication enterprises. 309-324 - Xiaobo Xu:

Effects of two national environmental factors on e-commerce functionality adoption: a cross-country case study of a global bank. 325-339
Volume 2, Number 4, 2008
- Marten van Sinderen

:
Challenges and solutions in enterprise computing. 341-346 - Dick A. C. Quartel, Marten van Sinderen

:
Modelling and analysing interoperability in service compositions using COSMO. 347-366 - Aries Tao Tao, Jian Yang

:
Towards policy driven context aware differentiated services design and development. 367-384 - Tobias Graml, Ralf Bracht, Marcus Spies:

Patterns of business rules to enable agile business processes. 385-402 - Jan Mendling

, Boudewijn F. van Dongen
, Wil M. P. van der Aalst
:
Getting rid of OR-joins and multiple start events in business process models. 403-419 - Florian Kerschbaum:

Building a privacy-preserving benchmarking enterprise system. 421-441 - Ting Wang, Jochem Vonk, Paul W. P. J. Grefen:

Towards a contractual approach for transaction management. 443-458 - Florian Rosenberg, Anton Michlmayr, Schahram Dustdar

:
Top-down business process development and execution using quality of service aspects. 459-475

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














