Conceptual modeling for simulation-based serious gaming
In recent years many simulation-based serious games have been developed for supporting (future) managers in operations management decision making....
Theoretical foundations for conceptual modelling in information systems development
Conceptual modelling in information systems development is the creation of an enterprise model for the purpose of designing the...
The impact of alternative diagrams on the accuracy of recall: A comparison of star-schema...
Data warehouses can be constructed using either a relational or a dimensional model. This research compares the diagrammatic representations...
Conceptual model for online auditing
The independent verification of the right applications of business rules in an information system is a task for auditors....
Using service responsibility tables to supplement UML in analyzing e-service systems
This paper proposes using Service Responsibility Tables (SRTs) as a tool in analyzing e-service systems. First it discusses difficulties...
Secure business process model specification through a UML 2.0 activity diagram profile
Business processes have become important resources, both for an enterprise's performance and to enable it to maintain its competitiveness....
A conceptual model for the logical design of temporal databases
Although widely advocated as a tool for the conceptual modelling of data, the Entity-Relationship (E-R) model and its...
The cube data model: a conceptual model and algebra for on-line analytical processing in...
Data warehousing and On-Line Analytical Processing OLAP are two of the most significant new technologies in the Ž ....
A framework for transformation from conceptual to logical workflow models
Both conceptual and logical workflow models are needed to support business process automation via workflow systems. Conceptual models are...
Access control and audit model for the multidimensional modeling of data warehouses
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the...