Registration - Accommodation
EASY CONFERENCES
Website: www.easyconferences.eu
Email:info@easyconferences.eu
ID | Paper | Track |
R01 | Toward Becoming a Data-Driven Organization: Challenges and Benefits
|
Research |
R02 | A Big Data Conceptual Model to Improve Quality of Business Analytics
|
Research |
R03 | How to Measure Influence in Social Networks?
|
Research |
R04 | Developing a Real-time Traffic Reporting and Forecasting Back-end System
|
Research |
R05 | IoT Analytics Architectures: Challenges, Solution Proposals and Future Research Directions
|
Research |
R06 | Structural Coupling, Strategy and Fractal Enterprise Modeling
|
Research |
R07 | Systems-Thinking Heuristics for the Reconciliation of Methodologies
|
Research |
R08 | An Ontology of IS Design Science Research Artefacts
|
Research |
R09 | Evolution of Enterprise Architecture for Intelligent Digital Systems
|
Research |
R10 | Online Peer Support Groups for Behaviour Change: Moderation Requirements
|
Research |
R11 | User-Experience in Business Intelligence - A Quality Construct and Model to Design Supportive BI Dashboards
|
Research |
R12 | FINESSE: Fair Incentives for Enterprise Employees
|
Research |
R13 | Explainable Recommendations in Intelligent Systems: Delivery Methods, Modalities and Risks
|
Research |
R14 | Participation in Hackathons: A Multi-Methods View on Motivators, Demotivators and Citizen Participation
|
Research |
R15 | A Systematic Literature Review of Blockchain-enabled Smart Contracts: Platforms, Languages, Consensus, Applications and Choice Criteria
|
Research |
R16 | Scriptless Testing at the GUI Level in an Industrial Setting
|
Research |
R17 | Improving Performance and Scalability of Model-Driven generated web applications: An Experience Report
|
Research |
R18 | TesCaV: An Approach for Learning Model-based Testing and Coverage in Practice
|
Research |
R19 | Automatic Classification Rules for Anomaly Detection in Time-series
|
Research |
R20 | Text Embeddings for Retrieval from a Large Knowledge Base
|
Research |
R21 | Predicting Unemployment with Machine Learning Based on Registry Data
|
Research |
R22 | Anomaly Detection on Data Streams – A LSTM’s Diary
|
Research |
R23 | Discovering Business Process Simulation Models in the Presence of Multitasking
|
Research |
R24 | TLKC-Privacy Model for Process Mining
|
Research |
R25 | Incremental Discovery of Hierarchical Process Models
|
Research |
R26 | Ontology Evolution in the Context of Model-based Secure Software Engineering
|
Research |
R27 | Blockchain-Based Personal Health Records for Patients’ Empowerment
|
Research |
R28 | COPri - a Core Ontology for Privacy Requirements Engineering
|
Research |
R29 | Privacy Preserving Real-Time Video Stream Change Detection Based on the Orthogonal Tensor Decomposition Models
|
Research |
PD01 | How the Anti-TrustRank Algorithm Can Help to Protect the Reputation of Financial Institutions
|
Poster/ Demo |
PD02 | Punctuation Restoration System for Slovenian Language
|
Poster/ Demo |
PD03 | Practice and Challenges of (De-)Anonymisation for Data Sharing
|
Poster/ Demo |
PD04 | A Study of Text Summarization Techniques for Generating Meeting Minutes
|
Poster/ Demo |
PD05 | CCOnto: Towards an Ontology-based Model for Character Computing
|
Poster/ Demo |
PD06 | A Tool for the Verification of Decision Model and Notation (DMN) Models
|
Poster/ Demo |
PD07 | Text as Semantic Fields: Integration of an Enriched Language Conception in the Text Analysis Tool Evoq
|
Poster/ Demo |
PD08 | MERLIN: an Intelligent Tool for Creating Domain Models
|
Poster/ Demo |
PD09 | Business Intelligence and Analytics: On-demand ETL Over Document Stores
|
Poster/ Demo |
PD10 | Towards an Academic Abstract Sentence Classification System
|
Poster/ Demo |
PD11 | DíalogoP - A Language and a Graphical Tool for Formally Defining GDPR Purposes
|
Poster/ Demo |
PD12 | Identifying the Challenges and Requirements of Enterprise Architecture Frameworks for IoT Systems
|
Poster/ Demo |
DC01 | A Holistic Approach towards Human Factors in Information Security and Risk
|
Doctoral Consortium |
DC02 | A Framework for Privacy Policy Compliance in the Internet of Things
|
Doctoral Consortium |
DC03 | Social-based Physical Reconstruction Planning in case of natural disaster: a Machine Learning Approach
|
Doctoral Consortium |
DC04 | Explainability Design Patterns in Clinical Decision Support Systems
|
Doctoral Consortium |
T01 | Expressing Strategic Variability and Flexibility of Processes: The Map Process Modelling Approach
|
Tutorial |
T02 | Data-Driven Requirements Engineering: Principles. Methods and Challenges
|
Tutorial |
T03 | Automated Machine Learning: State-of-The-Art and Open Challenges
|
Tutorial |
RP01 | Managing Cyber-physical Incidents Propagation in Health Services - SAFECARE
|
Research Project |
RP02 | New Scientific Journal Articles Everyday: Visualize or Perish!- IViSSEM
|
Research Project |
RP03 | A Model Driven Engineering Approach to Key Performance Indicators: Towards Self-Service Performance Management - SS-PM
|
Research Project |
RP04 | Next Level of Test Automation - TESTOMAT
|
Research Project |
RP05 | A cyberSecurity Platform for vIrtualiseD 5G cybEr Range services - SPIDER
|
Research Project |
RP06 | DEveloper COmpanion for Documented and annotatEd code Reference - DECODER
|
Research Project |
RP07 | Eco/logical Learning and Simulation Environments in Higher Education - ELSE
|
Research Project |
RP08 | Intelligent Verification/Validation for Extended Reality Based System - iv4XR Wishnu Prasetya, Rui Prada, Tanja E. J. Vos, Fitsum Kifetew, Frank Dignum, Jason Lander, Jean-Yves Donnart, Alexandre Kazmierowski, Joseph Davidson and Fernando Pastor Ricos |
Research Project |
ID | Paper | Track |
RP01 |
Managing Cyber-physical Incidents Propagation in Health Services - SAFECARE
|
Research Project |
RP02 | New Scientific Journal Articles Everyday: Visualize or Perish!- IViSSEM
|
Research Project |
RP03 | A Model Driven Engineering Approach to Key Performance Indicators: Towards Self-Service Performance Management - SS-PM
|
Research Project |
RP04 | Next Level of Test Automation - TESTOMAT
|
Research Project |
RP05 | A cyberSecurity Platform for vIrtualiseD 5G cybEr Range services - SPIDER
|
Research Project |
RP06 | DEveloper COmpanion for Documented and annotatEd code Reference - DECODER Miriam Gil, Fernando Pastor Ricos, Victoria Torres and Tanja E. J. Vos |
Research Project |
RP07 | Eco/logical Learning and Simulation Environments in Higher Education - ELSE Christos Mettouris, Evangelia Vanezi, Alexandros Yeratziotis, Alba Graziano and George A. Papadopoulos |
Research Project |
RP08 | Intelligent Verification/Validation for Extended Reality Based System - iv4XR Wishnu Prasetya, Rui Prada, Tanja E. J. Vos, Fitsum Kifetew, Frank Dignum, Jason Lander, Jean-Yves Donnart, Alexandre Kazmierowski, Joseph Davidson and Fernando Pastor Ricos |
Research Project |
ID | Paper | Track |
PD01 | How the Anti-TrustRank Algorithm Can Help to Protect the Reputation of Financial Institutions
|
Poster/ Demo |
PD02 | Punctuation Restoration System for Slovenian Language
|
Poster/ Demo |
PD03 | Practice and Challenges of (De-)Anonymisation for Data Sharing
|
Poster/ Demo |
PD04 | A Study of Text Summarization Techniques for Generating Meeting Minutes
|
Poster/ Demo |
PD05 | CCOnto: Towards an Ontology-based Model for Character Computing
|
Poster/ Demo |
PD06 | A Tool for the Verification of Decision Model and Notation (DMN) Models
|
Poster/ Demo |
PD07 | Text as Semantic Fields: Integration of an Enriched Language Conception in the Text Analysis Tool Evoq
|
Poster/ Demo |
PD08 | MERLIN: an Intelligent Tool for Creating Domain Models
|
Poster/ Demo |
PD09 | Business Intelligence and Analytics: On-demand ETL Over Document Stores
|
Poster/ Demo |
PD10 | Towards an Academic Abstract Sentence Classification System
|
Poster/ Demo |
PD11 | DíalogoP - A Language and a Graphical Tool for Formally Defining GDPR Purposes
|
Poster/ Demo |
PD12 | Identifying the Challenges and Requirements of Enterprise Architecture Frameworks for IoT Systems
|
Poster/ Demo |
ID | Paper | Track |
DC01 | A Holistic Approach towards Human Factors in Information Security and Risk
|
Doctoral Consortium |
DC02 | A Framework for Privacy Policy Compliance in the Internet of Things
|
Doctoral Consortium |
DC03 | Social-based Physical Reconstruction Planning in case of natural disaster: a Machine Learning Approach
|
Doctoral Consortium |
DC04 | Explainability Design Patterns in Clinical Decision Support Systems
|
Doctoral Consortium |
ID | Paper | Track |
T01 | Expressing Strategic Variability and Flexibility of Processes: The Map Process Modelling Approach
|
Tutorial |
T02 | Data-Driven Requirements Engineering: Principles. Methods and Challenges
|
Tutorial |
T03 | Automated Machine Learning: State-of-The-Art and Open Challenges
|
Tutorial |
ID | Paper | Track |
R01 | Toward Becoming a Data-Driven Organization: Challenges and Benefits
|
Research |
R02 | A Big Data Conceptual Model to Improve Quality of Business Analytics
|
Research |
R03 | How to Measure Influence in Social Networks?
|
Research |
R04 | Developing a Real-time Traffic Reporting and Forecasting Back-end System
|
Research |
R05 | IoT Analytics Architectures: Challenges, Solution Proposals and Future Research Directions
|
Research |
R06 | Structural Coupling, Strategy and Fractal Enterprise Modeling
|
Research |
R07 | Systems-Thinking Heuristics for the Reconciliation of Methodologies
|
Research |
R08 | An Ontology of IS Design Science Research Artefacts
|
Research |
R09 | Evolution of Enterprise Architecture for Intelligent Digital Systems
|
Research |
R10 | Online Peer Support Groups for Behaviour Change: Moderation Requirements
|
Research |
R11 | User-Experience in Business Intelligence - A Quality Construct and Model to Design Supportive BI Dashboards
|
Research |
R12 | FINESSE: Fair Incentives for Enterprise Employees
|
Research |
R13 | Explainable Recommendations in Intelligent Systems: Delivery Methods, Modalities and Risks
|
Research |
R14 | Participation in Hackathons: A Multi-Methods View on Motivators, Demotivators and Citizen Participation
|
Research |
R15 | A Systematic Literature Review of Blockchain-enabled Smart Contracts: Platforms, Languages, Consensus, Applications and Choice Criteria
|
Research |
R16 | Scriptless Testing at the GUI Level in an Industrial Setting
|
Research |
R17 | Improving Performance and Scalability of Model-Driven generated web applications: An Experience Report
|
Research |
R18 | TesCaV: An Approach for Learning Model-based Testing and Coverage in Practice
|
Research |
R19 | Automatic Classification Rules for Anomaly Detection in Time-series
|
Research |
R20 | Text Embeddings for Retrieval from a Large Knowledge Base
|
Research |
R21 | Predicting Unemployment with Machine Learning Based on Registry Data
|
Research |
R22 | Anomaly Detection on Data Streams – A LSTM’s Diary
|
Research |
R23 | Discovering Business Process Simulation Models in the Presence of Multitasking
|
Research |
R24 | TLKC-Privacy Model for Process Mining
|
Research |
R25 | Incremental Discovery of Hierarchical Process Models
|
Research |
R26 | Ontology Evolution in the Context of Model-based Secure Software Engineering
|
Research |
R27 | Blockchain-Based Personal Health Records for Patients’ Empowerment
|
Research |
R28 | COPri - a Core Ontology for Privacy Requirements Engineering
|
Research |
R29 | Privacy Preserving Real-Time Video Stream Change Detection Based on the Orthogonal Tensor Decomposition Models
|
Research |