Catálogo de publicaciones - libros

Compartir en
redes sociales


Business Information Systems: 10th International Conference, BIS 2007, Poznan, Poland, April 25-27, 2007. Proceedings

Witold Abramowicz (eds.)

En conferencia: 10º International Conference on Business Information Systems (BIS) . Poznań, Poland . April 25, 2007 - April 27, 2007

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Information Systems Applications (incl. Internet); IT in Business; Information Storage and Retrieval; Data Mining and Knowledge Discovery; Computers and Society; Management of Computing and Information Systems

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-72034-8

ISBN electrónico

978-3-540-72035-5

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2007

Tabla de contenidos

Context-Awareness in Mobile Service Meets Fine Location Estimate

Tomohisa Yamashita; Daisuke Takaoka; Noriaki Izumi; Akio Sashima; Koichi Kurumatani; Kôiti Hasida

In this paper, to tackle with uncertainty in the real world, the light-weight ontology drive approach is proposed for the realization of context dependent services. We concentrate on position information and an operation history, as a user’s context, and develop our location-aware content delivery system. The evaluation experiment of our location estimate engine is performed in Akihabara Software Showcase at Information Technology Research Institute. Furthermore, through the proofing experiment in Expo 2005 Aichi, our proposed architecture is confirmed to enables us to realize the real world application of context dependency. Finally, we compare our location-aware content delivery system and related researches, and discus the advantage of our system.

- Agents And Mobile Applications | Pp. 522-535

Adaptive Fuzzy Inventory Control Algorithm for Replenishment Process Optimization in an Uncertain Environment

Davorin Kofjač; Miroljub Kljajić; Andrej Škraba; Blaž Rodič

This paper presents a real case study of warehouse replenishment process optimization on a selected sample of representative materials. Optimization is performed with simulation model supported by inventory control algorithms. The adaptive fuzzy inventory control algorithm based on fuzzy stock-outs, highest stock level and total cost is introduced. The algorithm is tested and compared to the simulation results of the actual warehouse process and classic inventory control algorithms such as Least-unit cost, Part period balancing and Silver-Meal algorithm. The algorithms are tested on historic data and assessed using the Fuzzy Strategy Assessor (FSA). Simulation results are presented and advantages of fuzzy inventory control algorithm are discussed.

- Decision Support | Pp. 536-548

Post Decision-Making Analysis of the Reengineering Process Supported by Simulation Methods

Miroljub Kljajić; Andrej Škraba; Mirjana Kljajić Borštnar; Edvard Kolmanič

This paper analyzes seven years of experience in a concrete production company where reengineering was conducted by employing simulation methodology and AHP methods for decision support. A predictive validation of the simulation model as well as evaluation of the simulation methodology for decision assessment in enterprises was performed by comparing real and expected values. Multiple criteria methods for the simulation scenario selection were applied. The basic advantage of the described approach lies in the interactivity and transparency of the model representation, which is essential for model acceptance by user. The achieved results represent scholars’ example of using simulation methodology for solving managerial problems.

- Decision Support | Pp. 549-561

Contextual Classifier Ensembles

Janina Anna Jakubczyc

Individual classifiers do not always yield satisfactory results. In the field of data mining, failures are mainly thought to be caused by the limitations inherent in the data itself, which stem from different reasons for creating data files and their various applications. One of the proposed ways of dealing with these kinds of shortcomings is to employ classifier ensembles. Their application involves creating a set of models for the same data file or for different subsets of a specified data file. Although in many cases this approach results in a visible increase of classification accuracy, it considerably complicates, or, in some cases, effectively hinders interpretation of the obtained results. The reasons for this are the methods of defining learning tasks which rely on randomizing. The purpose of this paper is to present an idea for using data contexts to define learning tasks for classifier ensembles. The achieved results are promising.

- Decision Support | Pp. 562-569

An Algebraic Algorithm for Structural Validation of Social Protocols

Willy Picard

Support for human-to-human interactions over a network is still insufficient. In this paper a model for human-to-human collaboration based on the concept of social protocol is presented and formalized. Then, semantical and structural validity of social protocols is defined. Next, an algebraic representation of social protocols is proposed. Based on this algebraic representation of social protocols, an algorithm for structural validation of social protocols is proposed and illustrated by three examples.

- Social Issues | Pp. 570-583

Long Tails and Analysis of Knowledge Worker Intranet Browsing Behavior

Peter Géczy; Noriaki Izumi; Shotaro Akaho; Kôiti Hasida

We present a formal approach to analysis of human browsing behavior in electronic spaces. An analysis of knowledge workers’ interactions on a large corporate intranet have revealed that users form repetitive elemental and complex browsing patterns, use narrow spectrum of resources, and exhibit diminutive exploratory behavior. Knowledge workers had well defined targets and accomplished their browsing tasks via few subgoals. The analyzed aspects of browsing behavior exposed significant long tail characteristics that can be accurately modeled by the introduced novel distribution. The long tail behavioral effects present new challenges and opportunities for business information systems.

- Social Issues | Pp. 584-597

A Trustworthy Email System Based on Instant Messaging

Wenmao Zhang; Jun Bi; Miao Zhang; Zheng Qin

Email service is a killer application in the Internet. Due to the problem of SPAM, building a trustworthy and secure email service is an important research topic. This paper presents a new email system called SureMsg, which is based on Extensible Messaging and Presence Protocol (XMPP). In addition to the security mechanism provided by XMPP, a reputation mechanism is also designed for SureMsg. Therefore, SureMsg enhances the user authentication and is feasible for current Email service transition.

- Social Issues | Pp. 598-609

Towards Operationalizing Strategic Alignment of IT by Usage of Software Engineering Methods

Bernd Tilg; Joanna Chimiak-Opoka; Chris Lenz; Ruth Breu

This paper presents an enterprise–modelling oriented approach to IT Governance. Main requirements for a IT Governance Framework are presented and applicability is shown by means of operationalizing Strategic Alignment — a main focus area of IT Governance. Two frameworks are briefly described, namely PROSA (domain-specific for Strategic Business Alignment) and the general–purpose framework SQUAM for metamodelling, enterprise modelling and model-analysis. Key aspects of this approach are the information enrichment of enterprise models (mainly with key figures) and the integration into a Business Intelligence Suite for comprehensive business analysis.

- Specific MIS Issues | Pp. 610-625

A Modelling Approach for Dynamic and Complex Capacities in Production Control Systems

Wilhelm Dangelmaier; Benjamin Klöpper; Thorsten Timm; Daniel Brüggemann

In this paper we introduce some aspects of the development process of a production planning tool for a leading European car manufacturer. In this project we had to face a gap between theoretical problem definition in manufacturing planning and control and the actual requirements of the dispatcher. Especially the determination of production capacities and product processing times was a severe problem. The software system had to support the derivation of these important variables from shift plans, factory calendars and exceptional events. In order to implement this we defined a formal model that is a combination of the theoretical and practical view on manufacturing problem. The allows the dispatcher to provide up-to-date information in an easier way then provided by standard ERP systems about the production systems and transfers the information automatically to planning algorithms. Thus the production planning and control is always performed on the most recent information.

- Specific MIS Issues | Pp. 626-637

Product Line Architecture for RFID-Enabled Applications

Mikyeong Moon; Keunhyuk Yeom

Radio Frequency Identification (RFID) is an established technology and has the potential, in a variety of applications, to significantly reduce cost and improve performance. RFID may dramatically change an organization’s capacity to obtain real-time information concerning the location and properties of tagged people or objects. However, simply adding RFID to an existing process is a losing proposition. The entire process should be reconsidered in order to take advantage of real-time inventory data and the near real-time tracking and management of inventory. As RFID-enabled applications will fulfill similar tasks across a range of processes adapted to use the data gained from RFID tags, they can be considered as software products derived from a common infrastructure and assets that capture specific abstractions in the domain. That is, it may be appropriate to design RFID-enabled applications as elements of a product line. This paper discusses product line architecture for RFID-enabled applications. In developing this architecture, common activities are identified among the RFID-enabled applications and the variability in the common activities is analyzed in detail using variation point concepts. A product line architecture explicitly representing commonality and variability is described using UML activity diagrams. Sharing a common architecture and reusing assets to deploy recurrent services may be considered an advantage in terms of economic significance and overall quality.

- Specific MIS Issues | Pp. 638-651