DCNET/ICE-B/OPTICS最新文献

筛选
英文 中文
Analysing E-Business Applications with Business Provenance 利用业务来源分析电子商务应用程序
DCNET/ICE-B/OPTICS Pub Date : 2018-08-06 DOI: 10.5220/0003967902970300
Sérgio Manuel Serra da Cruz, L. Manhães, Macario Costa, Jorge Juan Zavaleta Gavidia
{"title":"Analysing E-Business Applications with Business Provenance","authors":"Sérgio Manuel Serra da Cruz, L. Manhães, Macario Costa, Jorge Juan Zavaleta Gavidia","doi":"10.5220/0003967902970300","DOIUrl":"https://doi.org/10.5220/0003967902970300","url":null,"abstract":"Business Provenance provides important documentation that is an essential to increase the trustworthiness and traceability of end-to-end business operations. This paper presents two data marts that allows multidimensional analysis of business provenance metadata collected from a real e-business scenario. Provenance was collected with the aid of an architecture named BizProv. We conclude the paper with the identification of the challenges that will drive future research of BizProv.","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134011471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Developing a Conceptual Framework to Structure an IT Organization using an Ontology Engineering Methodology 使用本体工程方法论开发构建IT组织的概念框架
DCNET/ICE-B/OPTICS Pub Date : 2018-08-01 DOI: 10.5220/0004068501740179
Nelson Gama, L. Ostrowski, M. Silva
{"title":"Developing a Conceptual Framework to Structure an IT Organization using an Ontology Engineering Methodology","authors":"Nelson Gama, L. Ostrowski, M. Silva","doi":"10.5220/0004068501740179","DOIUrl":"https://doi.org/10.5220/0004068501740179","url":null,"abstract":"Organizations are struggling to adopt practices that allow the best results trying to achieve alignment between IT and an organization’s concepts and dimensions, pursuing efficiency and effectiveness. Therefore, the structure of an IT organization is fundamental. However, despite the recognized importance of IT organizational structure and the efforts made in the development of disparate perspectives and relationships, no relevant references about its structure are found, and the existent ones are far from satisfactory. There is neither a single framework nor one relating to what we consider to be relevant or clearly dominant. This paper proposes the use of ontology engineering methodology to identify and enumerate concepts and develop a conceptual framework in order to structure and establish a relationship among concepts within an IT organization, which will allow the definition of an IT organization.","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116107907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Planning, Designing and Evaluating Multiple eGovernment Interventions 规划,设计和评估多种电子政府干预
DCNET/ICE-B/OPTICS Pub Date : 2018-07-30 DOI: 10.5220/0004071300850092
Fabrizio d'Amore, L. Laura, L. Luciani, Fabio Pagliarini
{"title":"Planning, Designing and Evaluating Multiple eGovernment Interventions","authors":"Fabrizio d'Amore, L. Laura, L. Luciani, Fabio Pagliarini","doi":"10.5220/0004071300850092","DOIUrl":"https://doi.org/10.5220/0004071300850092","url":null,"abstract":"We consider the scenario where an organ of a public administration, which we refer as the decisionmaker , is requested to plan one or more interventions in some framework related to the Information Society or the eGovernment set of actions. We propose a methodology to support the decisionmaker in orienting, planning, and evaluating multiple (partially overlapping) interventions. In particular, we address two main problems: first, how to decide the structure of the interventions and how to determine the relevant parameters involved; second, how to set up a scoring system for comparing single interventions and its extension to the case of multiple interventions. The methodology unexpectedly shows that i is not always the case that the best outcome is the one obtained by the best projects . We formally model the problem and discuss its computational complexity. Our approach is also effective in process of selecting, from a set of submitted proposals, the ones to be funded.","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"33 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128733162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Paths of Business Model Evolution - Findings from Business Model Patents 商业模式演化的路径——来自商业模式专利的发现
DCNET/ICE-B/OPTICS Pub Date : 2018-04-16 DOI: 10.5220/0004065401970200
Woori Han, B. Song, Yongtae Park
{"title":"Paths of Business Model Evolution - Findings from Business Model Patents","authors":"Woori Han, B. Song, Yongtae Park","doi":"10.5220/0004065401970200","DOIUrl":"https://doi.org/10.5220/0004065401970200","url":null,"abstract":"All firms have business models (BMs) and they continuously modify their BMs to adjust to dynamic environment. The objective of this paper is to find paths of technology based BM evolution by investigating BM patents which are representative data source of technical BMs. The paper begins by reviewing the BM and BM patents, and provides a description and justification of the proposed evolutionary paths of BM ‒ major (origination, transplant, mutation) and minor (variation, alternation, addition or subtraction) evolutionary stream. The paper concludes by highlighting the key findings and drawing limitation and","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124843427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Dimensioning for Delay Differentiation Services in Regular Plans for Mobile Clients 移动客户端常规计划中延迟差异化业务的数据维度
DCNET/ICE-B/OPTICS Pub Date : 2018-04-05 DOI: 10.5220/0004119500690074
J. Tsiligaridis
{"title":"Data Dimensioning for Delay Differentiation Services in Regular Plans for Mobile Clients","authors":"J. Tsiligaridis","doi":"10.5220/0004119500690074","DOIUrl":"https://doi.org/10.5220/0004119500690074","url":null,"abstract":"The broadcast problem including the plan design is considered. The data are inserted and numbered into customized size relations at a predefined order. The server ability to create a full, regular Broadcast Plan (RBP) with single and multiple channels after some data transformations is examined. The Basic Regular Algorithm (BRA) prepares an RBP and enables users to catch their items while avoiding wasting energy by their devices. In the case of multiple channels a dynamic grouping solution is proposed, called the Partition Value Algorithm with Less Dimension (PVALD), under a multiplicity constraint. In order to provide an RBP under relative delays a Dimensioning Algorithm (DA) is developed. The DA, with the criterion of ratio, offers the differentiation of service. This last property, in addition to the self-monitoring, and selforganizing, can be offered by servers today providing also channel availability and lower energy consumption by using a smaller, number of channels, of equal bandwidth. Simulation results are provided.","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133276679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Development of Smart Adaptive User Interfaces for Mobile e-Business Applications - Towards Enhancing User Experience - Some Lessons Learned 为流动电子商务应用开发智能自适应用户界面-迈向提升用户体验-一些经验教训
DCNET/ICE-B/OPTICS Pub Date : 2018-03-28 DOI: 10.5220/0004067002050214
Andreas Holzinger, Michael Geier, Panagiotis Germanakos
{"title":"On the Development of Smart Adaptive User Interfaces for Mobile e-Business Applications - Towards Enhancing User Experience - Some Lessons Learned","authors":"Andreas Holzinger, Michael Geier, Panagiotis Germanakos","doi":"10.5220/0004067002050214","DOIUrl":"https://doi.org/10.5220/0004067002050214","url":null,"abstract":"Mobile end users usually work in complex and hectic environments, consequently for mobile e-Business applications the design and development of context aware, smart, adaptive user interfaces is getting more and more important. The main goal is to make the user interface so simple that the end users can concentrate on their tasks – not on the handling of the application, the main challenge is its adaptation to the context. A possible solution is smart adaptation. Consequently, developers need to know the limits of both context and systems and must be aware of mobile end users different interaction. In this paper, we follow the hypothesis that simple user interfaces enhance performance and we report about some lessons learned during the design, development and evaluation of a smart, adaptive user interface for an e-Business application.","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133845295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Comparison Study of Some Collaborative Tools Use in Virtual Teams 虚拟团队中一些协作工具使用的比较研究
DCNET/ICE-B/OPTICS Pub Date : 2018-03-21 DOI: 10.5220/0004067203010304
Cosmina Carmen Aldea, A. Draghici
{"title":"Comparison Study of Some Collaborative Tools Use in Virtual Teams","authors":"Cosmina Carmen Aldea, A. Draghici","doi":"10.5220/0004067203010304","DOIUrl":"https://doi.org/10.5220/0004067203010304","url":null,"abstract":"This article describes the connectivity and networking of virtual team members (based on the reference review and some structured interview organized with members of virtual project teams) and new perspectives in virtual teams’ collaboration, to underline the actual trends and to identify their future development. Introduction of new communication tools with multiple options and functionalities that better support collaborative work and learning processes will also, facilitate the integration of new members, the communication and working processes and they will increase trust between members of virtual teams. The tools used for communication and real time research-work will increase competitiveness, too by optimizing the resources dedicated to different projects, teams and management systems. There are software tools that facilitate communication, collaboration and coordination of virtual teams. Choosing the right software has to consider the specific virtual teams’ needs and requirements. The best frame is one in which the characteristics are well defined so that they cover all aspects of collaborative activities and overall project","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125369799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel-encoded and SVD-assisted MIMO Multimode Transmission Schemes with Iterative Detection 具有迭代检测的信道编码和svd辅助MIMO多模传输方案
DCNET/ICE-B/OPTICS Pub Date : 2017-07-28 DOI: 10.5220/0004018203530360
S. Aust, A. Ahrens, S. Lochmann
{"title":"Channel-encoded and SVD-assisted MIMO Multimode Transmission Schemes with Iterative Detection","authors":"S. Aust, A. Ahrens, S. Lochmann","doi":"10.5220/0004018203530360","DOIUrl":"https://doi.org/10.5220/0004018203530360","url":null,"abstract":"In this contribution a coherent (2× 2) MIMO (multiple input multiple output) transmission with iterative detection over a measured multimode fiber channel at 1325 nm as well as at 1570 nm operating wavelength is studied. For the channel measurements a fibre length of 1 ,4 km were chosen. Extrinsic information transfer (EXIT) charts are used for analyzing and optimizing the convergence behaviour of the iterative demapping and decoding. Our results show that in order to achieve the best bit-error rate, not necessarily all MIMO layers have to be activated.","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131564369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Local Governments and Cloud Computing Security 地方政府与云计算安全
DCNET/ICE-B/OPTICS Pub Date : 2017-01-15 DOI: 10.5220/0004129102840288
Inita Kindzule, Edzus Zeiris, M. Ziema
{"title":"Local Governments and Cloud Computing Security","authors":"Inita Kindzule, Edzus Zeiris, M. Ziema","doi":"10.5220/0004129102840288","DOIUrl":"https://doi.org/10.5220/0004129102840288","url":null,"abstract":"The Cloud computing solution has enormous potential to provide companies, industries and economy in general with remarkable benefits but there are certain challenges that have to be taken into account when choosing this solution. The purpose of this paper is to provide results of research about local governments’ Cloud computing security, assisting them in making appropriate risk-based security decisions about how to securely embrace Cloud computing. To ensure that managing information of system-related security risks is consistent with the organization’s mission/business objectives, and that information security requirements, including necessary security controls, are integrated into the organization’s enterprise architecture and system development life cycle processes.","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"30 21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124697387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hash Algorithms for 8051-based Sensornodes 基于8051传感器节点的哈希算法
DCNET/ICE-B/OPTICS Pub Date : 2016-12-05 DOI: 10.5220/0004062400650068
Manuel Koschuch, Matthias Hudler, Michael Krüger
{"title":"Hash Algorithms for 8051-based Sensornodes","authors":"Manuel Koschuch, Matthias Hudler, Michael Krüger","doi":"10.5220/0004062400650068","DOIUrl":"https://doi.org/10.5220/0004062400650068","url":null,"abstract":"Wireless Sensors Networks are still an emerging technology. Their special architecture allows for unique applications that would be impossible, or at least very difficult, to implement using other technologies. But the wireless data transmission between the single nodes poses new challenges from a security point of view: the single messages have to be secured against eavesdropping and manipulation, as well as the individual nodes have to be secured against capture and extraction of their secret key. Cryptographic hash functions are an integral part of most cryptographic network protocols, whether they are used for signatures or message integrity. In this position paper, we describe a preliminary performance evaluation of three very different hash-functions on a Texas Instruments CC2530 sensor node, based on an 8051 microcontroller: Tiger, representing a hash designed for 64-bit architectures, the current standard SHA-1, and Grøstl, a SHA-3 finalist. Our preliminary results indicate that even without any major optimizations hash algorithms that were clearly not designed to run on constrained devices can be adapted to these environments with quite acceptable results, thereby giving designers of sensor network security protocols new implementation options.","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124440512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信