


default search action
Enterprise Information Systems, Volume 5
Volume 5, Number 1, 2011
- Marten van Sinderen

, João Paulo A. Almeida
:
Empowering enterprises through next-generation enterprise computing. 1-8
- Wilco Engelsman, Dick A. C. Quartel, Henk Jonkers, Marten van Sinderen

:
Extending enterprise architecture modelling with business goals and requirements. 9-36 - Per Närman, Hannes Holm

, Pontus Johnson
, Johan König, Moustafa Chenine, Mathias Ekstedt:
Data accuracy assessment using enterprise architecture. 37-58 - Ralph Mietzner, Frank Leymann

, Tobias Unger:
Horizontal and vertical combination of multi-tenancy patterns in service-oriented applications. 59-77 - Branimir Wetzstein, Philipp Leitner

, Florian Rosenberg, Schahram Dustdar
, Frank Leymann
:
Identifying influential factors of business process performance using dependency analysis. 79-98 - Sebastien Vaucouleur:

Code query by example. 99-123 - Bryce Day, Christof Lutteroth

:
Climbing the ladder: capability maturity model integration level 3. 125-144 - Guido Governatori

, Renato Iannella:
A modelling and reasoning framework for social networks policies. 145-167
Volume 5, Number 2, 2011
- Lian Duan

, W. Nick Street, E. Xu:
Healthcare information systems: data mining methods in the creation of a clinical recommender system. 169-181 - Nan Niu, Mingzhou Jin

, Jing-Ru C. Cheng:
A case study of exploiting enterprise resource planning requirements. 183-206 - Xiongfei Cao, Feng Yang:

Measuring the performance of Internet companies using a two-stage data envelopment analysis model. 207-217 - David Ming-Huang Chiang, Chia-Ping Lin, Mu-Chen Chen:

The adaptive approach for storage assignment by mining data of warehouse management system for distribution centres. 219-234 - Sameer Kumar, Brooke B. Kadow, Melissa K. Lamkin:

Challenges with the introduction of radio-frequency identification systems into a manufacturer's supply chain - a pilot study. 235-253 - Peggy E. Chaudhry, Sohail S. Chaudhry

, Stephen A. Stumpf, Hasshi Sudler:
Piracy in cyber space: consumer complicity, pirates and enterprise enforcement. 255-271
Volume 5, Number 3, 2011
- Xiangxian Chen, Yulin He, Hai Huang:

An approach to automatic development of interlocking logic based on Statechart. 273-286 - Yue-Hong Yin, J. Y. Xie:

Reconfigurable manufacturing execution system for pipe cutting. 287-299 - Ricardo Pérez-Castillo

, Barbara Weber
, Jakob Pinggera, Stefan Zugal, Ignacio García Rodríguez de Guzmán
, Mario Piattini
:
Generating event logs from non-process-aware systems enabling business process mining. 301-335 - Yi Zhang, Zongbin Li, Lida Xu, Jikong Wang:

A new method for automatic synthesis of tolerances for complex assemblies based on polychromatic sets. 337-358 - Laden Aldin, Sergio de Cesare:

A literature review on business process modelling: new frontiers of reusability. 359-383 - Eric Xu, Marek Wermus, Deborah Blythe Bauman:

Development of an integrated medical supply information system. 385-399
Volume 5, Number 4, 2011
- Milan Zdravkovic

, Hervé Panetto
, Miroslav Trajanovic
, Alexis Aubry
:
An approach for formalising the supply chain operations. 401-421 - Jinping Ma, Kanliang Wang, Lida Xu:

Modelling and analysis of workflow for lean supply chains. 423-447 - Yuyue Du, Liang Qi, MengChu Zhou:

A vector matching method for analysing logic Petri nets. 449-468 - Yuan Sun

, Anol Bhattacherjee:
Multi-level analysis in information systems research: the case of enterprise resource planning system usage in China. 469-494 - Chuan Fu, Guoqing Zhang, Jing Yang, Xiaona Liu:

Study on the contract characteristics of Internet architecture. 495-513

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














