planning - designing - developing IT
Special Interest Group on Systems Analysis and Design

Publications

Geometrically Enhanced Conceptual Modelling

0
Motivated among others by the need to support spatial modelling for the sustainable land use initiative we present a...

Conceptual Modeling in the Time of the Revolution: Part II

0
Conceptual Modeling was a marginal research topic at the very fringes of Computer Science in the 60s and 70s,...

Anchor Modeling

0
Maintaining and evolving data warehouses is a complex, error prone, and time consuming activity. The main reason for this...

Data Auditor: Analyzing Data Quality Using Pattern Tableaux

0
Monitoring databases maintain configuration and measurement tables about computer systems, such as networks and computing clusters, and serve important...

Schema AND Data: A Holistic Approach to Mapping, Resolution and Fusion in Information Integration

0
To integrate information, data in different formats, from dif- ferent, potentially overlapping sources, must be related and transformed to...

A Generic Set Theory-Based Pattern Matching Approach for the Analysis of Conceptual Models

0
Recognizing patterns in conceptual models is useful for a number of purposes, like revealing syntactical errors, model comparison, and...

An Empirical Study of Enterprise Conceptual Modeling

0
Business analysts, business architects, and solution consultants use a variety of practices and methods in their quest to understand...

Formalizing Linguistic Conventions for Conceptual Models

0
A precondition for the appropriate analysis of conceptual models is not only their syntactic correctness but also their semantic...

Monitoring and Diagnosing Malicious Attacks with Autonomic Software

0
Monitoring and diagnosing (M&D) software based on requirement models is a problem that has recently received a lot of...

A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations

0
Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes...