標(biāo)題: Titlebook: Enterprise Information Systems; 19th International C Slimane Hammoudi,Micha? ?mia?ek,Joaquim Filipe Conference proceedings 2018 Springer In [打印本頁] 作者: 機(jī)會(huì) 時(shí)間: 2025-3-21 19:21
書目名稱Enterprise Information Systems影響因子(影響力)
書目名稱Enterprise Information Systems影響因子(影響力)學(xué)科排名
書目名稱Enterprise Information Systems網(wǎng)絡(luò)公開度
書目名稱Enterprise Information Systems網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Enterprise Information Systems被引頻次
書目名稱Enterprise Information Systems被引頻次學(xué)科排名
書目名稱Enterprise Information Systems年度引用
書目名稱Enterprise Information Systems年度引用學(xué)科排名
書目名稱Enterprise Information Systems讀者反饋
書目名稱Enterprise Information Systems讀者反饋學(xué)科排名
作者: 休戰(zhàn) 時(shí)間: 2025-3-21 23:57
Heinz H?tzl,Peter M?ller,Eliahu Rosenthalitable to deal with dynamism and decentralization required by informal projects. Although commonly used, communication tools alone are not sufficient for managing informal projects, due to a lack of coordination mechanisms and project awareness. Based on recommendations of cooperative work, motivati作者: 束以馬具 時(shí)間: 2025-3-22 03:33
Muhammad Nawaz Khan,Adeel Mukhtar whether two not linked nodes in a network will connect in the future. Several studies have been proposed to solve it. Some of them compute a compatibility degree (link strength) between connected nodes and apply similarity metrics between non-connected nodes in order to identify potential links. Ho作者: 預(yù)兆好 時(shí)間: 2025-3-22 05:34
Land-Use Change in the Mekong Region,ieve a job position. The competence is defined by the set of skills that is necessary to execute an organizational function. In this case, it would be helpful to identify the sets of skills which is necessary to reach job positions. Currently, the on-line professional social networks are attracting 作者: epicondylitis 時(shí)間: 2025-3-22 11:54 作者: CANT 時(shí)間: 2025-3-22 13:26
https://doi.org/10.1007/978-94-017-6566-4, CPU-based algorithms. In this paper, we propose a parallel algorithm for the set similarity joins harnessing the power of GPU systems through filtering techniques and divide-and-conquer strategies that scale well with data size. Furthermore, we also present parallel algorithms for all data pre-pro作者: CANT 時(shí)間: 2025-3-22 19:29
MCM (Mechanics, Combat, and Multiplayer),ccessing log data. The DDM model allows us to understand whether novel instances of the target business process are deviant or not, thus becoming extremely useful in modern application scenarios such as cybersecurity and fraud detection. In this chapter, we further and significantly extend our previ作者: 防御 時(shí)間: 2025-3-22 22:46 作者: 惡臭 時(shí)間: 2025-3-23 03:51
https://doi.org/10.1007/978-3-642-27717-7 we introduce a drill-down procedure to measure the extent to which the inflow or outflow of a particular bank explains an anomaly. Experimental results on real-world payment data show that our method can detect the liquidity problems of a bank when it was subject to a bank run with reasonable accur作者: aptitude 時(shí)間: 2025-3-23 06:05
Conclusion: The Wealth of Virtual Nations,de a more efficient organisation of the complex multidisciplinary workflows involved. They also support the timely decision making required for meeting strict treatment constraints for patients within limited hospital resources. However, implementing clinical pathways is challenging because of the v作者: MILK 時(shí)間: 2025-3-23 13:18
Christopher Dobson,Ronald Paynent the current functioning of the IT industry, in which companies co-create innovations and extend their solutions by means of partnerships. This research investigates the driving factors of relationships in a software ecosystem. To address this goal, we performed multiple case studies of two emergi作者: CLIFF 時(shí)間: 2025-3-23 17:02 作者: nauseate 時(shí)間: 2025-3-23 18:06 作者: 弄污 時(shí)間: 2025-3-24 02:06
Why Weather Forecasters Are So Often Wrong,ample, by using standards such as WSDL and the workflow technology. In order to wire these components several endpoints must be exchanged, e.g., the IP addresses of deployed services. However, this exchange of endpoint information is highly dependent on the (i)?middleware technologies, (ii)?programm作者: 有毒 時(shí)間: 2025-3-24 04:12
The Web Professional’s Handbook been introduced in the market as conventional toys equipped with electronic components that enable wireless network communication with mobile devices, which provide services to enhance the toy’s functionalities and data transmission over Internet. Smart toys provide users with a more sophisticated 作者: 逗它小傻瓜 時(shí)間: 2025-3-24 07:06 作者: 托人看管 時(shí)間: 2025-3-24 14:13
Lecture Notes in Business Information Processinghttp://image.papertrans.cn/e/image/311472.jpg作者: Albumin 時(shí)間: 2025-3-24 17:46 作者: BAIL 時(shí)間: 2025-3-24 21:58
Enterprise Information Systems978-3-319-93375-7Series ISSN 1865-1348 Series E-ISSN 1865-1356 作者: constitute 時(shí)間: 2025-3-25 01:16
https://doi.org/10.1007/978-3-642-27717-7 we introduce a drill-down procedure to measure the extent to which the inflow or outflow of a particular bank explains an anomaly. Experimental results on real-world payment data show that our method can detect the liquidity problems of a bank when it was subject to a bank run with reasonable accuracy.作者: chapel 時(shí)間: 2025-3-25 03:31 作者: 種族被根除 時(shí)間: 2025-3-25 07:54
Land-Use Change in the Mekong Region,se it allows to identify conceptual structures in data sets, through conceptual lattice and implications. A specific set of implications, know as proper implications, represent the set of conditions to reach a specific goal. So, in this work, we proposed a FCA-based approach to identify and analyze 作者: 萬花筒 時(shí)間: 2025-3-25 15:21
https://doi.org/10.1007/978-3-030-44168-5ta quality problems identified in the TPC-DI data source. Furthermore, in order to prevent data quality problems and proactively manage data quality, we propose a set of practical guidelines for researchers and practitioners to conduct data quality management when using the TPC-DI benchmark.作者: 遺留之物 時(shí)間: 2025-3-25 19:34 作者: 易怒 時(shí)間: 2025-3-26 00:00
Conclusion: The Wealth of Virtual Nations,drug deliveries, and (3) address ethical concerns related to the fairness of resource allocation. Our claim is supported by an extensive validation on a series of scenarios of different size, load and complexity.作者: nutrition 時(shí)間: 2025-3-26 00:41 作者: 身心疲憊 時(shí)間: 2025-3-26 07:52
What Is Old and New in Our Democracies?suitability for PDSS specification in a problem investigation. We propose decision-specific adjustments of TORE (DsTORE), which we evaluate in a case study. . This paper is an extended version of previously published work. The contribution of this paper is fourfold. First, the suitability of the tas作者: cleaver 時(shí)間: 2025-3-26 11:39 作者: 奇怪 時(shí)間: 2025-3-26 14:01 作者: defile 時(shí)間: 2025-3-26 20:41
The Web Professional’s Handbookmart toys have been recently reported in the news. In this context, this paper presents an analysis of the toy computing environment based on the threat modelling process from Microsoft Security Development Lifecycle with the aim of identifying a minimum set of security requirements a smart toy shou作者: Pepsin 時(shí)間: 2025-3-26 21:00
https://doi.org/10.1007/978-1-4612-1846-3 it with a new one, .ntology for .ftware .factoring (OSORE). We also introduce a new tool, our .factoring .commender .tem (RESYS) which is capable of binding our two ontologies. As a result, refactorings are automatically chosen and semantically linked to their respective code smells. We also conduc作者: 借喻 時(shí)間: 2025-3-27 03:52 作者: Talkative 時(shí)間: 2025-3-27 08:50
Data Quality Problems in TPC-DI Based Data Integration Processesta quality problems identified in the TPC-DI data source. Furthermore, in order to prevent data quality problems and proactively manage data quality, we propose a set of practical guidelines for researchers and practitioners to conduct data quality management when using the TPC-DI benchmark.作者: 我的巨大 時(shí)間: 2025-3-27 10:47 作者: 使殘廢 時(shí)間: 2025-3-27 15:39
Quality of Care Driven Scheduling of Clinical Pathways Under Resource and Ethical Constraintsdrug deliveries, and (3) address ethical concerns related to the fairness of resource allocation. Our claim is supported by an extensive validation on a series of scenarios of different size, load and complexity.作者: Ataxia 時(shí)間: 2025-3-27 20:28
Strategies to Foster Software Ecosystem Partnerships – A System Dynamics Analysish. We believe that practitioners can benefit from this synthesis by understanding the facilitators to reinforce and barriers to restrain, as a means to catalyse the success of their networks. In addition, we demonstrate for researchers the utility of System Dynamics to provide a diagnostic of releva作者: Memorial 時(shí)間: 2025-3-28 01:43 作者: 收到 時(shí)間: 2025-3-28 03:43 作者: 浮雕寶石 時(shí)間: 2025-3-28 07:49 作者: FOVEA 時(shí)間: 2025-3-28 11:27 作者: Ingratiate 時(shí)間: 2025-3-28 17:38
An Approach for Semantically-Enriched Recommendation of Refactorings Based on the Incidence of Code it with a new one, .ntology for .ftware .factoring (OSORE). We also introduce a new tool, our .factoring .commender .tem (RESYS) which is capable of binding our two ontologies. As a result, refactorings are automatically chosen and semantically linked to their respective code smells. We also conduc作者: 嘲笑 時(shí)間: 2025-3-28 22:44 作者: Narrative 時(shí)間: 2025-3-29 01:29
Using a Time-Based Weighting Criterion to Enhance Link Prediction in Social Networks whether two not linked nodes in a network will connect in the future. Several studies have been proposed to solve it. Some of them compute a compatibility degree (link strength) between connected nodes and apply similarity metrics between non-connected nodes in order to identify potential links. Ho作者: 后來 時(shí)間: 2025-3-29 06:17 作者: 致詞 時(shí)間: 2025-3-29 09:57 作者: 有權(quán) 時(shí)間: 2025-3-29 13:05
Efficient Filter-Based Algorithms for Exact Set Similarity Join on GPUs, CPU-based algorithms. In this paper, we propose a parallel algorithm for the set similarity joins harnessing the power of GPU systems through filtering techniques and divide-and-conquer strategies that scale well with data size. Furthermore, we also present parallel algorithms for all data pre-pro作者: 服從 時(shí)間: 2025-3-29 17:51 作者: 四海為家的人 時(shí)間: 2025-3-29 21:43
Triplet Markov Chains Based- Estimation of Nonstationary Latent Variables Hidden with Independent Noxtensively used due to their ability to recover hidden variables from observed ones even for large data. Such models fail, however, to handle nonstationary data when parameters are unknown. The aim of this paper is to show how the recent triplet Markov chains, strictly more general models exhibiting作者: 飛行員 時(shí)間: 2025-3-30 03:48 作者: Incisor 時(shí)間: 2025-3-30 04:04
Quality of Care Driven Scheduling of Clinical Pathways Under Resource and Ethical Constraintsde a more efficient organisation of the complex multidisciplinary workflows involved. They also support the timely decision making required for meeting strict treatment constraints for patients within limited hospital resources. However, implementing clinical pathways is challenging because of the v作者: 無彈性 時(shí)間: 2025-3-30 10:00 作者: Aggregate 時(shí)間: 2025-3-30 14:09 作者: creatine-kinase 時(shí)間: 2025-3-30 17:31 作者: 招人嫉妒 時(shí)間: 2025-3-30 23:52
A Method and Programming Model for Developing Interacting Cloud Applications Based on the TOSCA Stanample, by using standards such as WSDL and the workflow technology. In order to wire these components several endpoints must be exchanged, e.g., the IP addresses of deployed services. However, this exchange of endpoint information is highly dependent on the (i)?middleware technologies, (ii)?programm作者: Offstage 時(shí)間: 2025-3-31 03:12 作者: FRAX-tool 時(shí)間: 2025-3-31 07:43
An Approach for Semantically-Enriched Recommendation of Refactorings Based on the Incidence of Code equences. Refactorings are considered adequate resources when it comes to reducing or removing the undesirable effects of smells in software. Ontologies and semantics can play a substantial role in reducing the interpretation burden of software engineers as they have to decide about adequate refacto