標題: Titlebook: E-Technologies: Transformation in a Connected World; 5th International Co Gilbert Babin,Katarina Stanoevska-Slabeva,Peter Kr Conference pro [打印本頁] 作者: 到凝乳 時間: 2025-3-21 16:04
書目名稱E-Technologies: Transformation in a Connected World影響因子(影響力)
書目名稱E-Technologies: Transformation in a Connected World影響因子(影響力)學(xué)科排名
書目名稱E-Technologies: Transformation in a Connected World網(wǎng)絡(luò)公開度
書目名稱E-Technologies: Transformation in a Connected World網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱E-Technologies: Transformation in a Connected World被引頻次
書目名稱E-Technologies: Transformation in a Connected World被引頻次學(xué)科排名
書目名稱E-Technologies: Transformation in a Connected World年度引用
書目名稱E-Technologies: Transformation in a Connected World年度引用學(xué)科排名
書目名稱E-Technologies: Transformation in a Connected World讀者反饋
書目名稱E-Technologies: Transformation in a Connected World讀者反饋學(xué)科排名
作者: 圓錐體 時間: 2025-3-21 23:45
Towards Model-Based Support for Managing Organizational Transformationgh ongoing transformation and renewal, while their external environment is changing simultaneously. In such a setting, it is imperative for organizations to continuously monitor their performance and adjust when there is a need. The technology that delivers this monitoring capability is called Busin作者: expire 時間: 2025-3-22 00:55
Cloud Computing Providers: Characteristics and Recommendationsummarized and joined together in a general definition; then, two classifications of cloud computing are presented. These results are used to assess the existing cloud computing providers. A sample of success stories is analyzed to find out which benefits were realized by current cloud computing cons作者: 帳單 時間: 2025-3-22 06:34 作者: 壓倒 時間: 2025-3-22 10:46
Searching, Translating and Classifying Information in Cyberspaceurrent technologies or to the intrinsic properties of all natural languages. We then analyze the effectiveness of freely available machine translation services and demonstrate that under certain conditions these translation systems can operate at the same performance levels as manual translators. Se作者: facilitate 時間: 2025-3-22 15:17
E-Tourism Portal: A Case Study in Ontology-Driven Developmentre that addresses the users’ needs, on-time, and within budget, remains an elusive goal. This is even more true for internet applications presents additional challenges, including, 1) a predominance of the highly volatile interaction logic, and 2) stronger time-to-market pressures. Model-driven deve作者: facilitate 時間: 2025-3-22 18:23 作者: 標準 時間: 2025-3-22 23:08
Softw,re Integration – An Onto-Neural Perspectivesing intelligible (ontological) and distributed (neural networks) knowledge representations to guide design and implementation of application interfaces. We believe this yields benefits over manual approaches currently used, in which business specifications are first captured, then translated into t作者: Disk199 時間: 2025-3-23 05:23 作者: STYX 時間: 2025-3-23 08:22 作者: allude 時間: 2025-3-23 12:17
A Study of E-Government Architecturesntries readiness to citizen connectivity, etc. We concentrate in this paper on architectural design of e-government systems according to a software engineering point of view which among all other considerations promises also the success of the final operational platform. In fact, architectural desig作者: Autobiography 時間: 2025-3-23 14:00 作者: 聲音刺耳 時間: 2025-3-23 19:29 作者: Carcinogen 時間: 2025-3-23 23:06
Following the Conversation: A More Meaningful Expression of Engagementays, and the presence of spammers, it is necessary to discover new ways of quantifying success. In this paper, we explore the nature of engagement on Twitter and find the traditional follower/following network to be meaningless in this regard. Building on previous research, we define engagement in t作者: Junction 時間: 2025-3-24 04:46 作者: 沒有準備 時間: 2025-3-24 08:13 作者: 陰謀小團體 時間: 2025-3-24 11:20
Intelligent Monitoring System for Online Listing and Auctioninges assign special personnel, a large team of monitoring experts, to monitor the items posted on the web to ensure a safe and healthy online trading atmosphere. This process costs a lot for such companies and also takes a lot of time. In this research we propose a solution to this problem as an autom作者: Eeg332 時間: 2025-3-24 15:09 作者: 表示向前 時間: 2025-3-24 22:25
1865-1348 es Diablerets, Switzerland, January 23-26, 2011. Originally 10 papers were selected from a total of 32 submissions. Seven additional papers were included following a second round of reviewing and improvement.The papers in this volume cover topics such as process modeling, organizational transformati作者: legislate 時間: 2025-3-25 00:01
Elemente der Fünften Hauptgruppee existing cloud computing providers. A sample of success stories is analyzed to find out which benefits were realized by current cloud computing consumers, and we contrast our findings with the ones of other empirical investigations. Finally, the risks of cloud computing are collected from the relevant literature to derive some recommendations.作者: BRIDE 時間: 2025-3-25 04:13 作者: 做方舟 時間: 2025-3-25 09:01
Cloud Computing Providers: Characteristics and Recommendationse existing cloud computing providers. A sample of success stories is analyzed to find out which benefits were realized by current cloud computing consumers, and we contrast our findings with the ones of other empirical investigations. Finally, the risks of cloud computing are collected from the relevant literature to derive some recommendations.作者: GRAVE 時間: 2025-3-25 11:53
Flexible Communication Based on Linguistic and Ontological Cuese selected action. Action selection involves using linguistic cues, processing the input sentence uses ontological cues as well as the knowledge-base structure. The architecture can be extended to information systems, an example of which is given in the paper.作者: inchoate 時間: 2025-3-25 17:20
1865-1348 ded following a second round of reviewing and improvement.The papers in this volume cover topics such as process modeling, organizational transformation, e-Business, e-Government, e-Education, and e-Health.978-3-642-20861-4978-3-642-20862-1Series ISSN 1865-1348 Series E-ISSN 1865-1356 作者: 極為憤怒 時間: 2025-3-25 22:05 作者: GIBE 時間: 2025-3-26 02:40
Elements of Topological Dynamicsechnical specifications, and finally implemented, often by costly third-party integration specialists. The present work initiates research efforts towards automation of the latter two activities, with a potential impact on professional-services costs and time-to-operation.作者: ANT 時間: 2025-3-26 06:29
The Future of the Visible Universe,ernative route to the main ones. Our approach uses the . type auction: when an agent does not have an alternative route, it launches an auction. The agent offering the best price will be the next hop of the route.作者: 輕觸 時間: 2025-3-26 09:15 作者: 新鮮 時間: 2025-3-26 15:31 作者: endure 時間: 2025-3-26 20:28
Conference proceedings 2011ary 23-26, 2011. Originally 10 papers were selected from a total of 32 submissions. Seven additional papers were included following a second round of reviewing and improvement.The papers in this volume cover topics such as process modeling, organizational transformation, e-Business, e-Government, e-作者: 諄諄教誨 時間: 2025-3-27 00:53 作者: Aggrandize 時間: 2025-3-27 02:06 作者: 貪婪地吃 時間: 2025-3-27 05:35
s justified the focus on Enterprise 2.0, the individual skills that facilitated their initial progress in this area, and the roadmap and metrics used to guide and evaluate these experiments. A short discussion section will close the case by exploring the value proposition for the organization and the industry as a whole.作者: acclimate 時間: 2025-3-27 11:23
User Mode Process and System Calls,without the knowledge of the holder. In this paper we describe a novel proxy auditing solution that addresses this issue directly. We describe the design and implementation of this solution and illustrate its application in widely distributed and heterogeneous research environments.作者: Limousine 時間: 2025-3-27 16:55
Data-Based Digital Art Practice,ionship strength and influence by capturing the frequency of interactions between users. We tested our model in a simulated social network of 150 users. Results show that our model succeeds in excluding spammers and inactive users from the calculation and in handling fake friendships.作者: meditation 時間: 2025-3-27 19:04
Searching, Translating and Classifying Information in Cyberspacethird part we explain how the principle machine learning strategies are able to classify short passages of text extracted from the blogosphere as factual or opinionated and then classify their polarity (positive, negative or mixed).作者: Deduct 時間: 2025-3-27 23:56
Toward a Goal-Oriented, Business Intelligence Decision-Making Frameworkeir impact. Such models enable the aggregation of Key Performance Indicators and their integration to goal models that display good cognitive fit. Managers can monitor the impact of decisions on organization goals and improve decision models. The approach is illustrated through a retail business real-life example.作者: Foreknowledge 時間: 2025-3-28 03:18
Harnessing Enterprise 2.0 Technologies: The Midnight Projectss justified the focus on Enterprise 2.0, the individual skills that facilitated their initial progress in this area, and the roadmap and metrics used to guide and evaluate these experiments. A short discussion section will close the case by exploring the value proposition for the organization and the industry as a whole.作者: arabesque 時間: 2025-3-28 06:52
The Design, Development and Application of a Proxy Credential Auditing Infrastructure for Collaboratwithout the knowledge of the holder. In this paper we describe a novel proxy auditing solution that addresses this issue directly. We describe the design and implementation of this solution and illustrate its application in widely distributed and heterogeneous research environments.作者: TERRA 時間: 2025-3-28 12:40 作者: 報復(fù) 時間: 2025-3-28 18:24 作者: intelligible 時間: 2025-3-28 20:30
https://doi.org/10.1007/978-3-662-25863-7on including workflows, roles, entities, events, alerts and performance indicators. In this paper, we describe the engineering of a model-based application framework for managed processes used to implement a palliative care managed process application for severe pain management.作者: 技術(shù) 時間: 2025-3-28 23:28 作者: 機密 時間: 2025-3-29 07:07
Model-Based Engineering of a Managed Process Application Frameworkon including workflows, roles, entities, events, alerts and performance indicators. In this paper, we describe the engineering of a model-based application framework for managed processes used to implement a palliative care managed process application for severe pain management.作者: analogous 時間: 2025-3-29 10:48
Evolution of Goal-Driven Pattern Families for Business Process Modelingze a mechanism for evolving a pattern-based framework for goal-driven business process models. We demonstrate its feasibility with an example from the patient safety domain that illustrates how to evolve a pattern family with our extension algorithm.作者: 飛鏢 時間: 2025-3-29 14:44
Softw,re Integration – An Onto-Neural Perspectiveechnical specifications, and finally implemented, often by costly third-party integration specialists. The present work initiates research efforts towards automation of the latter two activities, with a potential impact on professional-services costs and time-to-operation.作者: Catheter 時間: 2025-3-29 19:17
Decentralized Task Allocation Mechanism Applied to QoS Routing in Home Networkernative route to the main ones. Our approach uses the . type auction: when an agent does not have an alternative route, it launches an auction. The agent offering the best price will be the next hop of the route.作者: 江湖騙子 時間: 2025-3-29 21:24
Following the Conversation: A More Meaningful Expression of Engagementerms of interactions using the @ notation, and visualize this as a graph. We then apply clique finding techniques to this graph, to extract a sub-graph of the most important connections in a user’s immediate network.作者: 健壯 時間: 2025-3-29 23:55 作者: 健談 時間: 2025-3-30 04:42 作者: 不溶解 時間: 2025-3-30 11:05 作者: 細絲 時間: 2025-3-30 14:23
E-Technologies: Transformation in a Connected World978-3-642-20862-1Series ISSN 1865-1348 Series E-ISSN 1865-1356 作者: Erythropoietin 時間: 2025-3-30 16:57 作者: 協(xié)迫 時間: 2025-3-30 22:52
https://doi.org/10.1007/978-3-662-30624-6t, HtmlUnit). There is little awareness in the literature that a test specification language like TTCN-3 can be effectively combined with such frameworks. In this paper, we identify the essential aspects of TTCN-3 for penetration testing and how best to use them. These include separating abstract te作者: Infusion 時間: 2025-3-31 03:19
Analyse von Hydrazin und seinen Salzengh ongoing transformation and renewal, while their external environment is changing simultaneously. In such a setting, it is imperative for organizations to continuously monitor their performance and adjust when there is a need. The technology that delivers this monitoring capability is called Busin作者: ALIEN 時間: 2025-3-31 07:12 作者: 史前 時間: 2025-3-31 13:12 作者: Campaign 時間: 2025-3-31 13:30 作者: 宏偉 時間: 2025-3-31 18:00 作者: dendrites 時間: 2025-4-1 01:45 作者: 做作 時間: 2025-4-1 04:22 作者: 云狀 時間: 2025-4-1 08:23
https://doi.org/10.1007/978-1-349-81789-4entify possible actions requested by the human, and a second step where natural language data are interpreted by agents that possibly could execute the selected action. Action selection involves using linguistic cues, processing the input sentence uses ontological cues as well as the knowledge-base 作者: 捐助 時間: 2025-4-1 14:08 作者: 演繹 時間: 2025-4-1 16:46 作者: flimsy 時間: 2025-4-1 18:46