H. Mcheick, Malak Khreis, Hala Sweidan, I. Zaarour
{"title":"PHEN: Parkinson Helper Emergency Notification System Using Bayesian Belief Network","authors":"H. Mcheick, Malak Khreis, Hala Sweidan, I. Zaarour","doi":"10.1007/978-3-319-17957-5_14","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_14","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114181128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Examining the Effects of Perceived Enjoyment and Habit on Smartphone Addiction: The Role of User Type","authors":"Chongyang Chen, Kem Z. K. Zhang, Sesia J. Zhao","doi":"10.1007/978-3-319-17957-5_15","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_15","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132499314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Testing Policy-Based e-Health Monitoring Processes Using TTCN-3","authors":"B. Stepien, Benjamin Eze, L. Peyton","doi":"10.1007/978-3-319-17957-5_13","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_13","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132269113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mathieu Nayrolles, É. Beaudry, Naouel Moha, Petko Valtchev, A. Hamou-Lhadj
{"title":"Towards Quality-Driven SOA Systems Refactoring Through Planning","authors":"Mathieu Nayrolles, É. Beaudry, Naouel Moha, Petko Valtchev, A. Hamou-Lhadj","doi":"10.1007/978-3-319-17957-5_18","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_18","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130255785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding Consumer Participation on Companies' Brand Microblogs","authors":"Kem Z. K. Zhang, M. Benyoucef, Sesia J. Zhao","doi":"10.1007/978-3-319-17957-5_8","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_8","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122086085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Technology Artifacts in the Regulatory Compliance of Business Processes: A Meta-Analysis","authors":"O. Akhigbe, Daniel Amyot, Gregory Richards","doi":"10.1007/978-3-319-17957-5_6","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_6","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120978281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Boubaker, H. Mili, Abderrahmane Leshob, Yasmine Charif
{"title":"Towards Automating Business Process Compensation Scoping Logic","authors":"A. Boubaker, H. Mili, Abderrahmane Leshob, Yasmine Charif","doi":"10.1007/978-3-319-17957-5_2","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_2","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132277176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recommender Engines Under the Influence of Popularity","authors":"G. Blot, P. Saurel, F. Rousseaux","doi":"10.1007/978-3-319-17957-5_9","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_9","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128812735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Flow-Based Security Levels Assessment for Access Control Systems","authors":"S. Boulares, K. Adi, L. Logrippo","doi":"10.1007/978-3-319-17957-5_7","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_7","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127148002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}