Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
MCETECH
MCETECH 2008
Generate Citations
International MCETECH Conference on e-Technologies
Jan. 23 2008 to Jan. 25 2008
ISBN: 978-0-7695-3082-6
Table of Contents
Papers
Conference organization
Freely available from IEEE.
pp. xii
Papers
[Roster]
Freely available from IEEE.
pp. 264
Papers
Program Committee
Freely available from IEEE.
pp. xi
Papers
Table of contents
Freely available from IEEE.
pp. v-vii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Message du Pr?sident du Congr?
Freely available from IEEE.
pp. viii
Papers
Message from the Conference Chair
Freely available from IEEE.
pp. ix
Papers
Message from the Program Committee Co-chairs
Freely available from IEEE.
pp. x
Papers
Toward an Integrated User Requirements Notation Framework and Tool forBusiness Process Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-15
by
Alireza Pourshahid
,
Daniel Amyot
,
Liam Peyton
,
Sepideh Ghanavati
,
Pengfei Chen
,
Michael Weiss
,
Alan J. Forster
Papers
Modelling the Interaction of Distributed Systems as Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-24
by
Johannes Reich
Papers
Human Workflows via Document-Driven Process Choreography
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-33
by
Jiangbo Dang
,
Candemir Toklu
,
Ken Hampel
,
Urs Enke
Papers
Towards Adaptability Support in Collaborative Business Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-45
by
Isma? Khriss
,
Enrico L?vesque
,
Guy Tremblay
,
Andr? Jacques
Papers
Formal Modeling for Security Behavior Analysis of Computer Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-59
by
Kamel Adi
,
Lamia Hamza
,
Liviu Pene
Papers
A Model of Trusted Data Collection for Knowledge Discovery in B2B Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-69
by
Jun Hu
,
Liam Peyton
,
Cameron Turner
,
Hany Bishay
Papers
Anonymous Credentials for Privacy-Preserving E-learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-80
by
Esma A?meur
,
Hicham Hage
,
Flavien Serge Mani Onana
Papers
Understanding and Countering Insider Threats in Software Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-90
by
Michael Franz
Papers
Strategies for Cross-Organizational Service Composition
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-103
by
Christoph Schroth
,
Till Janner
,
Volker Hoyer
Papers
Signature-Based Composition of Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-115
by
Aniss Alkamari
,
Hafedh Mili
,
Abdel Obaid
Papers
Failure Semantics in a SOA Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-121
by
Chris Hobbs
,
Hanane Becha
,
Daniel Amyot
Papers
Design and Implementation of the Pervaho Middleware for Mobile Context-Aware Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-135
by
Patrick Eugster
,
Beno? Garbinato
,
Adrian Holzer
Papers
Contextualized Linguistic Matching for Heterogeneous Data Source Integration
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-147
by
Youssef Bououlid Idrissi
,
Julie Vachon
Papers
Recommendation Quality Evolution Based on Neighbors Discrimination
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-153
by
Zied Zaier
,
Robert Godin
,
Luc Faucher
Papers
Ontology Learning from Text Using Relational Concept Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-163
by
Mohamed Rouane Hacene
,
Amedeo Napoli
,
Petko Valtchev
,
Yannick Toussaint
,
Rokia Bendaoud
Papers
NetSim: a Simulation and Visualization Software for Information Network Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-177
by
M?lanie Lord
,
Daniel Memmi
Papers
Towards a Knowledge-Base for Building Complex, Proactive and Service-Oriented E-negotiation Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-189
by
Giannis Koumoutsos
,
Kleanthis Thramboulidis
Papers
Issues for IT Governance in a Large Not-for-Profit Organization: A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-202
by
Carla L. Wilkin
,
Jon L. Riddett
Papers
Public-Private Partnership in e-Government: A Case Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-211
by
Alain Sandoz
,
Jean-Ren? Eudes
,
Rapha?lle Pr?vot
Papers
Learning to Trust the Crowd: Some Lessons from Wikipedia
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-216
by
F. Xavier Olleros
Papers
Assessing the Applicability of Use Case Maps for Business Process and Workflow Description
Full-text access may be available. Sign in or learn about subscription options.
pp. 219-222
by
Gunter Mussbacher
,
Daniel Amyot
Papers
Implementing ERP in SMEs: Towards an Ontology Supporting Managerial Decisions
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-226
by
Hamid Nach
,
Albert Lejeune
Papers
Proposition of a Method for the Development and Deployment of e-Government Systems that Emphasize Good Governance
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-231
by
Driss Kettani
,
Bernard Moulin
,
Asmae El Mahdi
Papers
The Security Requirements Behavior Model for Trustworthy Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-238
by
Kassem Saleh
,
Maryam Habil
Papers
Trust and Autonomic Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-242
by
H. Lutfiyya
,
M. Perry
,
C. Yew
Papers
SecurityViews: A Dynamic Security for View-Oriented Programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-246
by
Hamid Mcheick
,
Eric Dallaire
Papers
Considerations of Service Assembly Based on the Analysis of Data Flows between Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-252
by
George Feuerlicht
Papers
Behavioral Interface Conformance Checking for WS-BPEL Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-257
by
Aziz Salah
,
Guy Tremblay
,
Aida Chami
Papers
Practical Load Distribution Models for Web Services Based environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-261
by
Elarbi Badidi
,
M. Adel Serhani
,
Larbi Esmahi
,
Mohamed Elkoutbi
Papers
Author Index
Freely available from IEEE.
pp. 262
Showing 40 out of 40