2017 IEEE 19th Conference on Business Informatics (CBI)

24-27 July 2017

Go

Filter Results

Displaying Results 1 - 25 of 65
  • [Front cover]

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (3049 KB)
    Freely Available from IEEE
  • [Title page i - Vol 1]

    Publication Year: 2017, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • [Title page iii - Vol 1]

    Publication Year: 2017, Page(s): iii
    Request permission for commercial reuse | |PDF file iconPDF (226 KB)
    Freely Available from IEEE
  • [Copyright notice - Vol 1]

    Publication Year: 2017, Page(s): iv
    Request permission for commercial reuse | |PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Table of contents - Volume 1

    Publication Year: 2017, Page(s):v - x
    Request permission for commercial reuse | |PDF file iconPDF (162 KB)
    Freely Available from IEEE
  • CBI 2017 Preface - Volume 1

    Publication Year: 2017, Page(s): xi
    Request permission for commercial reuse | |PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2017, Page(s): xii
    Request permission for commercial reuse | |PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Programme Committee

    Publication Year: 2017, Page(s):xiii - xiv
    Request permission for commercial reuse | |PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2017, Page(s): xv
    Request permission for commercial reuse | |PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Track Chairs

    Publication Year: 2017, Page(s): xvi
    Request permission for commercial reuse | |PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Forecasting Monthly Sales Retail Time Series: A Case Study

    Publication Year: 2017, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1079 KB) | HTML iconHTML

    This paper presents a case study concerning the forecasting of monthly retail time series recorded by the US Census Bureau from 1992 to 2016. The modeling problem is tackled in two steps. First, original time series are de-trended by using a moving windows averaging approach. Subsequently, the residual time series are modeled by Non-linear Auto-Regressive (NAR) models, by using both Neuro-Fuzzy an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Forecasting Stock Prices from the Limit Order Book Using Convolutional Neural Networks

    Publication Year: 2017, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (269 KB) | HTML iconHTML

    In today's financial markets, where most trades are performed in their entirety by electronic means and the largest fraction of them is completely automated, an opportunity has risen from analyzing this vast amount of transactions. Since all the transactions are recorded in great detail, investors can analyze all the generated data and detect repeated patterns of the price movements. Being able to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recommendation and Configuration of Value-Added Services for Repurposing Electric Vehicle Batteries: A Vertical Software Prototype

    Publication Year: 2017, Page(s):13 - 22
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (719 KB) | HTML iconHTML

    Due to degradation effects, electric vehicle batteries (EVBs) have a lifetime of approximately ten years in electric vehicles (EVs). Recycling EVBs is inefficient and ecologically undesirable if the batteries can be repurposed to second life scenarios. Decision support systems (DSSs) can be implemented to identify the best second life scenario for which to repurpose individual batteries. However, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Development of an Event-driven In-memory Business Process Engine

    Publication Year: 2017, Page(s):23 - 32
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (244 KB) | HTML iconHTML

    Although organizations have widely adopted Business Process Management Systems (BPMS) as an automation and integration middleware, these systems remain limited in their orchestration capabilities. BPMS can only react to event information that enterprise applications emit and only integrate against the service interfaces these applications provide. At the same time, organizations increasingly lever... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordinating Business Processes Using Semantic Relationships

    Publication Year: 2017, Page(s):33 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (227 KB) | HTML iconHTML

    In enterprises, different business processes collaborate to achieve a common business goal. The processes involved in such a collaboration are connected to each other in one-to-one, one-to-many, and many-to-many relationships. The complex interdependencies between these processes require proper process coordination. Current approaches addressing process coordination rely on message exchanges betwe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attribute-Based Security Verification of Business Process Models

    Publication Year: 2017, Page(s):43 - 52
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (384 KB) | HTML iconHTML

    Business processes, as the instruments used by organisations to produce value, need to comply with a number of internally and externally imposed standards and restrictions. Since the majority of such processes involve the exchange of sensitive third party information, their compliance to security constraints needs to be verified before they can be implemented. Current attempts for the verification... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Trans-Device Content Experience and Knowledge Development for Detection of TV Audiences

    Publication Year: 2017, Page(s):53 - 61
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (782 KB) | HTML iconHTML

    Household audience ratings are the currency of the television broadcasting business. Information communication technology has rapidly changed television viewing since the beginning of this century, and the reproducibility of audience ratings as media indicators is beginning to be questioned. This is because television viewing through various devices must be considered, due to the decline of simult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Risks and Innovativeness Influence the Selection of Partner in NPD Alliances

    Publication Year: 2017, Page(s):62 - 69
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (268 KB) | HTML iconHTML

    Most often, if a new product is complex, a unique company doesn't have all the competences or means to achieve alone its development. In this case alliances must be formed to carry on the development project. However, alliances often meet difficulties in achieving their objectives. That is mainly due to difficulties of communication between partners, or to missing skills or means required to go fu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Enterprise Architecture to Assist Business Continuity Planning in Large Public Organizations

    Publication Year: 2017, Page(s):70 - 78
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (641 KB) | HTML iconHTML

    Business continuity planning (BCP) requires a holistic approach that considers several technological and organizational aspects. Currently, there is a lack of scientifically validated solutions to support continuity planning that are based on standards and best practice frameworks, capable of addressing the complexity and specific needs of large public organizations. In this work, we propose to us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling the Evolution of Enterprise Architectures Using Ontologies

    Publication Year: 2017, Page(s):79 - 88
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (514 KB) | HTML iconHTML

    Enterprise architecture supports enterprise transformation through model-based holistic descriptions that capture and share the knowledge, concepts, and relationships representing the enterprise. Although enterprise architecture models portray the gap between the as-is and to-be enterprise, they disregard the underlying aspects that together enact enterprise transformation. This paper proposes an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Locating and Visualizing the Most Valuable Business Processes States in Large Control Policy Graphs Produced by POMDP

    Publication Year: 2017, Page(s):89 - 98
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1544 KB) | HTML iconHTML

    This paper is motivated by the problem of identifying and presenting the most valuable states delivered by a partially observable Markov decision process (POMDP) policy graph with large number of edges and nodes. A control policy graph is the result of executing a POMDP algorithm to a welldefined set of system state transitions, and is composed of a prediction about the value achieved by each stat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risk Management: A Maturity Model Based on ISO 31000

    Publication Year: 2017, Page(s):99 - 108
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (440 KB) | HTML iconHTML

    Risk Management, according with the ISO Guide 73 is the set of “coordinated activities to direct and control an organization with regard to risk”. In a nutshell, Risk Management is the business process used to manage risk in organizations. ISO 31000 defines a framework and process for risk management. However, implementing this standard without a detailed plan can become a burden on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guided Interaction Exploration in Artifact-centric Process Models

    Publication Year: 2017, Page(s):109 - 118
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (570 KB) | HTML iconHTML

    Artifact-centric process models aim to describe complex processes as a collection of interacting artifacts. Recent development in process mining allow for the discovery of such models. However, the focus is often on the representation of the individual artifacts rather than their interactions. Based on event data we can automatically discover composite state machines representing artifact-centric ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-stage Deep Learning Approach for Business Process Event Prediction

    Publication Year: 2017, Page(s):119 - 128
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (324 KB) | HTML iconHTML

    The ability to proactively monitor business processes is one of the main differentiators for firms to remain competitive. Process execution logs generated by Process Aware Information Systems (PAIS) help to make various business process specific predictions. This enables a proactive situational awareness related to the execution of business processes. The goal of the approach proposed in the curre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Comprehensive Business Process Optimization Framework

    Publication Year: 2017, Page(s):129 - 134
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (149 KB) | HTML iconHTML

    Business processes are a collection of related, structured activities performed to achieve a defined business outcome. Adopting a business process perspective is an essential advantage for organizations to orchestrate and achieve continuous improvements on time and within specified resource constraints. The increased popularity of this domain, however, has resulted in a variety of interdisciplinar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.