Isabelle WATTIAU
Isabelle WATTIAU
Verified email at
Cited by
Cited by
A taxonomy of evaluation methods for information systems artifacts
N Prat, I Comyn-Wattiau, J Akoka
Journal of Management Information Systems 32 (3), 229-267, 2015
Artifact evaluation in information systems design-science research–a holistic view
N Prat, I Comyn-Wattiau, J Akoka
A UML-based data warehouse design method
N Prat, J Akoka, I Comyn-Wattiau
Decision support systems 42 (3), 1449-1473, 2006
Research on Big Data–A systematic mapping study
J Akoka, I Comyn-Wattiau, N Laoufi
Computer Standards & Interfaces 54, 105-115, 2017
Ontologies for security requirements: A literature survey and classification
A Souag, C Salinesi, I Comyn-Wattiau
International conference on advanced information systems engineering, 61-69, 2012
Conceptual modeling quality-from EER to UML schemas evaluation
SSS Cherfi, J Akoka, I Comyn-Wattiau
International Conference on Conceptual Modeling, 414-428, 2002
A security ontology for security requirements elicitation
A Souag, C Salinesi, R Mazo, I Comyn-Wattiau
International symposium on engineering secure software and systems, 157-177, 2015
Reusable knowledge in security requirements engineering: a systematic mapping study
A Souag, R Mazo, C Salinesi, I Comyn-Wattiau
Requirements Engineering 21 (2), 251-283, 2016
A Framework for Quality Evaluation in Data Integration Systems.
J Akoka, L Berti-Equille, O Boucelma, M Bouzeghoub, I Comyn-Wattiau, ...
ICEIS (3), 170-175, 2007
Extracting generalization hierarchies from relational databases: A reverse engineering approach
N Lammari, I Comyn-Wattiau, J Akoka
Data & Knowledge Engineering 63 (2), 568-589, 2007
View integration by semantic unification and transformation of data structures
M Bouzeghoub
Proc. Int. Conf. on Entity-Relationship Approach (ER'90), 413-430, 1990
Entity-relationship and object-oriented model automatic clustering
J Akoka, I Comyn-Wattiau
Data & Knowledge Engineering 20 (2), 87-117, 1996
Design science research contribution to business intelligence in the cloud—A systematic literature review
OS Mwilu, I Comyn-Wattiau, N Prat
Future Generation Computer Systems 63, 108-122, 2016
Dimension hierarchies design from UML generalizations and aggregations
J Akoka, I Comyn-Wattiau, N Prat
International Conference on Conceptual Modeling, 442-455, 2001
Using security and domain ontologies for security requirements analysis
A Souag, C Salinesi, I Wattiau, H Mouratidis
2013 IEEE 37th Annual Computer Software and Applications Conference …, 2013
Combining objects with rules to represent aggregation knowledge in data warehouse and OLAP systems
N Prat, I Comyn-Wattiau, J Akoka
Data & Knowledge Engineering 70 (8), 732-752, 2011
Logistics information system auditing using expert system technology
I Comyn-Wattiau, J Akoka
Expert Systems with Applications 11 (4), 463-473, 1996
Using linguistic knowledge in view integration: Toward a third generation of tools
E Métais, Z Kedad, I Comyn-Wattiau, M Bouzeghoub
Data & knowledge engineering 23 (1), 59-78, 1997
Model driven reverse engineering of NoSQL property graph databases: The case of Neo4j
I Comyn-Wattiau, J Akoka
2017 IEEE International Conference on Big Data (Big Data), 453-458, 2017
Assessment and analysis of information quality: a multidimensional model and case studies
L Berti-Équille, I Comyn-Wattiau, M Cosquer, Z Kedad, S Nugier, ...
International Journal of Information Quality 2 (4), 300-323, 2011
The system can't perform the operation now. Try again later.
Articles 1–20