ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)最新文献

筛选
英文 中文
A methodology for the selection of knowledge management (KM) tools 知识管理(KM)工具选择的方法论
N. Patel, V. Hlupic
{"title":"A methodology for the selection of knowledge management (KM) tools","authors":"N. Patel, V. Hlupic","doi":"10.1109/ITI.2002.1024701","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024701","url":null,"abstract":"As a result of the increasing popularity of knowledge management numerous knowledge management tools have appeared on the software market. Therefore, selecting a tool that suitably meets their requirements is difficult and confusing for many organisations. Consequently a methodology is designed that describes the issues and factors that should be taken into consideration during the selection of a knowledge management tool.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117116304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Off-line signature verification using geometric features specific to Chinese handwriting 离线签名验证使用特定的几何特征,以中国手写
Yaqian Shen, Qinghua Qianq, Jingui Pan
{"title":"Off-line signature verification using geometric features specific to Chinese handwriting","authors":"Yaqian Shen, Qinghua Qianq, Jingui Pan","doi":"10.1109/ITI.2002.1024679","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024679","url":null,"abstract":"This paper is concerned with the off-line signature verification scheme. The distinction in our work is that we have taken more consideration with the Chinese signature structure. And we present four main features for the optimization of the verification of the Chinese signatures, viz, the envelop of the signature, cross-count feature, center of gravity of sub-region and distance between vectors made of center of gravity, and area of embedded white space. Experimental results show that the combination of the four-feature based classifiers increases the verification accuracy, particularly for the Chinese signature verification.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115169036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Surprises in modeling decision problems 建模决策问题中的意外
R. E. Wendell
{"title":"Surprises in modeling decision problems","authors":"R. E. Wendell","doi":"10.1109/ITI.2002.1024647","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024647","url":null,"abstract":"Insights in modeling are often surprises that occur as part of the modeling process. These can happen in many ways and for many reasons. This paper discusses how some such surprises occurred in real applications based on personal experiences of the author. The goal of the paper is to help develop a better understanding for the types and the impacts of surprises that may occur in practice, which in turn hopefully can lead to more effective modeling.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127552213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-centric collaboration for wired and wireless platforms 有线和无线平台的以数据为中心的协作
I. Marsic
{"title":"Data-centric collaboration for wired and wireless platforms","authors":"I. Marsic","doi":"10.1109/ITI.2002.1024646","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024646","url":null,"abstract":"With the proliferation of mobile computing devices there is an increasing demand for applications supporting collaboration among users working in the field and in the office. A key component for collaboration in this domain is sharing and manipulation of information using very different devices and communications. We propose a novel, data-centric collaboration paradigm, where each user can obtain a subset of the shared data and the data may be visualized differently for different users. The data amount and the visualization technique reflect the user's interests and/or computing and communication capabilities. The users collaborate on and exchange data, and the data is dynamically transformed to adapt to the particular computing/network platform. The resulting design is simple yet very powerful and scalable. It is implemented and tested by developing several complex groupware applications.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122992720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The role of ontologies in the application of KM strategies 本体在知识管理策略应用中的作用
P. Fehér
{"title":"The role of ontologies in the application of KM strategies","authors":"P. Fehér","doi":"10.1109/ITI.2002.1024694","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024694","url":null,"abstract":"Effective operation of organisations requires intensive use of knowledge in the recent, highly competitive environment, therefore knowledge became one of the most valuable resources of companies. There re the development of knowledge management support systems (KMSS.) has an increasing and important role. Unfortunately there is no, or just a very light connection between business demands and the technological solutions. In this article an integrated framework is presented to connect these areas. Related to the framework, the role of organisational and domain/task ontologies is examined.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"512 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116196458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Web farming as a support for e-business systems 网络农场作为电子商务系统的支持
Jacek Ciarkowski
{"title":"Web farming as a support for e-business systems","authors":"Jacek Ciarkowski","doi":"10.1109/ITI.2002.1024692","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024692","url":null,"abstract":"The aim of this paper is to present the methodology of Web farming and the examples of its usage. Due to using numerous technologies relevant to Internet (Web mining, data warehouse, CRM and many others) it offers a singularly strong support for e-business systems. It enables efficient and methodical, as well a systematic search in Internet resources for current and up-to-date information, as well as gathering it in a specific form, subject to subsequent distribution and analysis. Exemplary problems and the ways of coping with them are discussed, with focus on technologies used to this purpose.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115221252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applications classification and QoS requirements 应用分类和QoS要求
D. Žagar, S. Rimac-Drlje
{"title":"Applications classification and QoS requirements","authors":"D. Žagar, S. Rimac-Drlje","doi":"10.1109/ITI.2002.1024725","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024725","url":null,"abstract":"The applications and network services are key points that could provide the user the necessary quality of service. It is very hard to definitely divide the applications and the underlying services to uniquely describe the application and the service classes. This paper tries to comprise different classes of applications into a unique classification. Different standpoints and criteria are included and evaluated The QoS requirements for every defined application class are defined and described. Finally, on the basis of the introduced classification the required service classes for serving such classes are defined.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125816939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Sober thoughts on multimedia based distance learning 基于多媒体的远程教育的清醒思考
W. Halang
{"title":"Sober thoughts on multimedia based distance learning","authors":"W. Halang","doi":"10.1109/ITI.2002.1024645","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024645","url":null,"abstract":"This contribution sets out, with general observations on distance learning, and with identifying the fundamental difference between learning at presence or from a distance, which is essentially decoupling of teaching and learning in time and speed. Then, experiences with developing and employing multimedia material in distance teaching are presented, covering the phases of initial euphoria and subsequent disillusion. Realising that the use of development tools may be counterproductive, a pragmatic approach to developing multimedia courses under tight financial and labour constraints is outlined. It is concluded that students value simple things, that content is much more important than appearance, and that computers and multimedia must be used in a very thoughtful way in order not to be detrimental to the educational process.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126020700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proactive monitoring of the information system risk and quality 主动监控信息系统的风险和质量
A. Trad, D. Kalpić, K. Fertalj
{"title":"Proactive monitoring of the information system risk and quality","authors":"A. Trad, D. Kalpić, K. Fertalj","doi":"10.1109/ITI.2002.1024687","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024687","url":null,"abstract":"Proactive system monitoring is the search for potential problems in the Information Systems (IS) before they occur. With reference to IS, monitoring is always proactive. Watching for evidence of emerging or potential problems and identifying their source (factor), checking available disk space, the health of essential processes, probing systems to ensure that they are reachable, business requirement fulfilment; these are all examples of detecting problems before they disrupt the work/flow of an IS. Monitoring is not something that should be cavalierly put off until there's nothing else on the development team's schedule to be done. As soon as the IS is put in production, it is time to start to protect it against all possible types of problems.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"40 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129101245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A new approach for vertex guarding of planar graphs 平面图顶点保护的一种新方法
B. Kaucic, B. Žalik
{"title":"A new approach for vertex guarding of planar graphs","authors":"B. Kaucic, B. Žalik","doi":"10.1109/ITI.2002.1024709","DOIUrl":"https://doi.org/10.1109/ITI.2002.1024709","url":null,"abstract":"Vertex guarding is one of many optimisation problems in graph theory with wide area of applications. It is proven to be NP-hard, therefore fast approximative solutions are significant. In the paper, at first, known algorithms are considered, and then a new algorithm working on planar graphs is introduced. The new algorithm is based on the dynamic approach and produces better and faster solutions. Its efficiency among other algorithms is demonstrated experimentally. In addition, ideas to additionally improve the algorithm are presented at the end.","PeriodicalId":420216,"journal":{"name":"ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces (IEEE Cat. No.02EX534)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122012516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信