Enterprise Information Systems: 13th International Conference, ICEIS 2011, Beijing, China, June 8-11, 2011, Revised Selected Papers

Published on: 2012-05-20
Page Count: 436 pages
Print Type: BOOK
Maturity Rating: NOT_MATURE
Language: en
Embeddable: Yes
PDF Available: Yes
EPUB Available: No
ISBN-13: 9783642299582
ISBN-10: 364229958X
... pre-task(IR, PP). The result Truth indicates the task Identify Requirements as predecessor to the task Plan Project and False indicates the opposite. Considering the sequence established in Figure 4 among the activities it is possible ...

Related books - Readers Also Liked

Enterprise Information Systems: 12th International Conference, ICEIS 2010, Funchal-Madeira, Portugal, June 8-12, 2010, Revised Selected Papers

... gigabyte.com.tw/ the domain name gigabyte.com.tw is extracted. If the product page cannot be retrieved on-site, the algorithm falls back to the next producer site candidate from the phrase search. 3.2 Product Detail Page Retrieval For ...

Enterprise Information Systems: 12th International Conference, ICEIS 2010, Funchal-Madeira, Portugal, June 8-12, 2010, Revised Selected Papers

... list of grammatical word categories transmitted through education has been historically tampered with by the ... words into two broad groups: lexical terms (comprising Nouns, Verbs, Adjectives and Adverbs) and grammatical terms. But some PoS ...

Research and Practical Issues of Enterprise Information Systems II Volume 2: IFIP TC 8 WG 8.9 International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS 2007), October 14-16, 2007, Beijing, China

... Informatica , SAS Institute , SPF Plus , IBM and Actuate . In addition , the ... questions to be more direct and effective , and helping the researcher ... data warehousing . Therefore , those factors were mainly used to start each ...

Enterprise Information Systems: 24th International Conference, ICEIS 2022, Virtual Event, April 25–27, 2022, Revised Selected Papers

... substitutable by another application task variant or non-substitutable. This depends on the type of parameter that is used in the parameter condition. If the parameter is “changeable”, then its value can be changed to invoke an ...

Enterprise Information Systems: 18th International Conference, ICEIS 2016, Rome, Italy, April 25–28, 2016, Revised Selected Papers

... (SaPA) was developed (Fig. 2). An update frequency (UF) was added into the SaPA for the possibility of regulating how often the algorithm will be refreshed. Thus, a UF value of 5 means that the safest path will be calculated once for ...

Enterprise Information Systems: 19th International Conference, ICEIS 2017, Porto, Portugal, April 26-29, 2017, Revised Selected Papers

... IMDB4 (a collection of movie titles, TV shows, etc), with 300k registers, which are popular datasets used in previous work [13]. We pre-processed the data sets, removing accents and punctuation, and setting all characters to lowercase ...

Enterprise, Business-Process and Information Systems Modeling: 12th International Conference, BPMDS 2011, and 16th International Conference, EMMSAD 2011, Held at CAiSE 2011, London, UK, June 20-21, 2011. Proceedings

... Systems Development, vol. 1999, pp. 205–222. CRC Press, Boca Raton (1998) [8] Bider, I.: Object driver: a method for analysis, design, and implementation of interactive applications. In: Handbook of Systems Development, vol. 1999, pp ...

Nominations--June-August 1973, Hearings..., 93-1, on Nomination of June 11, 1973. John K. Tabor..., June 13, 1973, John W. Barnum..., June 14, 1973, Mayo J. Thompson ..., June 26, 1973, Sidney Lewis Jones..., August 2, 1973, Karl E. Bakke....

... Meyerhoff , chairwoman of the STAN Committee , during which she requested me to stop by her house in order to pick up $ 50,000 in cash which she said represented payment for tickets to be used by people from the Washington area . " I ...

Trusted Systems: Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers

... code on the target host or probe the target for open ports. In our proposed technique ... VMware Workstation/Player or VirtualBox. In the sequel, for simplicity, we ... 11,13,18]. In this case, the malware will execute malicious code if a ...

Communication Systems and Information Technology: Selected Papers from the 2011 International Conference on Electric and Electronics (EEIC 2011) in Nanchang, China on June 20-22, 2011, Volume 4

... thinking, the ability to improve the innovative design. 2.2 The Features of ... non-logical thinking. 2) Differentiation: Composition between the two are ... linear thinking, thus forming a divergent thinking, reverse thinking, lateral ...

Enterprise Systems. Strategic, Organizational, and Technological Dimensions: International Workshops, Pre-ICIS 2010, St. Louis, MO, USA, December 12, 2010, Pre-ICIS 2011, Shanghai, China, December 4, 2011, and Pre-ICIS 2012, Orlando, FL, USA, December 16, 2012, Revised Selected Papers

... cross-functional process integration [3, 14]. The integration of data and processes requires that the enterprise system be aligned with the best practices that the system is designed to support. When enterprise systems are introduced ...

Re-conceptualizing Enterprise Information Systems: 5th IFIP WG 8.9 Working Conference, CONFENIS 2011, Aalborg, Denmark, October 16-18, 2011, Revised Selected Papers

... design team should be given more leverage to experiment with new ideas, and organizational learning should be ... edn. Wiley & Sons, New Jersey (2009) 4. Pahl, G., Beitz, W., Feldhusen, J., Grote, K.H.: Engineering Design – A Systematic ...

Re-conceptualizing Enterprise Information Systems: 5th IFIP WG 8.9 Working Conference, CONFENIS 2011, Aalborg, Denmark, October 16-18, 2011, Revised Selected Papers

... ILOG JRules Tutorial | ILOG JRules Interview ..., http://www.javagenious.com/.../ILOG-JRULES-TUTORIALS 8. Wille, R.: Restructuring lattice theory: an approach based on hierarchies of concepts. In: Rival, I. (ed.) Ordered Sets, pp. 445 ...

Proceedings of the Multi-Conference 2011: 2nd International Conference on Signals, Systems & Automation (ICSSA 2011) & 1st International Conference on Intelligent Systems & Data Processing (ICISD 2011)

... voice distortion [11]. In addition, it has been argued that analysis in the cepstral domain for this application is justified by the presence of noise level information in the cepstrum [12] and that MFCC give a compression of this ...

Electrical Power Systems and Computers: Selected Papers from the 2011 International Conference on Electric and Electronics (EEIC 2011) in Nanchang, China on June 20-22, 2011, Volume 3

... internal and external factors, scope of the value is between [0,1]. When the value of internal factor is between [0 ... evaluation. At last, according to the principles of maximum membership degree, the results can be reached. First, ...

International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II

... explained previously fraud has a large cost to businesses. Additionally, fraud ... study has been performed on the disproportionate nature of these costs, with ... China's listed companies and CART detecting approach. Int. J. Inf. Technol ...

International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

... Dorks to find target websites and built an automated detection tool by generating regular expressions for query dorks. Their results show that at least 12% of search results are vulnerable to SQL injection attacks. Later, John et al ...

Computer Aided Systems Theory -- EUROCAST 2011: 13th International Conference, Las Palmas de Gran Canaria, Spain, February 6-11, 2011, Revised Selected Papers

... principal component analysis ( PCA ) [ 9 ] and weighted PCA to find the proper directions . The template Temps is the set of proper directions obtained by the standard PCA . For Tempw , the reason to use the weighted matrix is that we ...

Computer Aided Systems Theory -- EUROCAST 2011: 13th International Conference, Las Palmas de Gran Canaria, Spain, February 6-11, 2011, Revised Selected Papers, Part I

... reality described by an OAT. Definition 4. Given a basis T, any combination of arrays using operations ∼, ‡ and ... prime array of expression Ei if there is no other array |tj| such that, |ty| ≼ |tj| ≼ Ei. A prime array is a “largest ...

Enterprise Information Systems: 11th International Conference, ICEIS 2009, Milan, Italy, May 6-10, 2009, Proceedings

... map end-user requirements to the types of data required to satisfy them. We believe that our approach is particularly useful in DW prototyping environments, since (i) a dimensional template works as a pre-built solution and (ii) the ...

Information Hiding: 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers

... question is a systematic comparison of the detection performance of our ... Goljan, M., Fridrich, J., Chen, M.: Sensor noise camera identification ... Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In ...

Research and Practical Issues of Enterprise Information Systems: IFIP TC 8 International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS 2006) April 24-26, 2006, Vienna, Austria

... Enterprise Systems : the Business Manager's Perspective . Information Systems Journal 30 ( 2002 ) 38-46 16. Rosemann , M .: Enterprise System Management with Reference 316 Research and Practicial Issues of Enterprise Information Systems.

Security and Intelligent Information Systems: International Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers

... Music Transcription. Springer, New York (2006) Kubera, E.: The role of temporal attributes in identifying instruments in polytimbral music recordings (in polish). Ph.D. dissertation, Polish-Japanese Institute of Information Technology ...

Electrical Engineering and Control: Selected Papers from the 2011 International Conference on Electric and Electronics (EEIC 2011) in Nanchang, China on June 20-22, 2011, Volume 2

... RSCP received by the UE from every handover process happens during the outfield test. Table 2. Measurement of handover and handover time in the Outfield test PCCPCH Measured Values(dB) RSCP Mean C/I Mean Before Handover -69.93 8.73 ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.