Catálogo de publicaciones - libros
Business Information Systems: 10th International Conference, BIS 2007, Poznan, Poland, April 25-27, 2007. Proceedings
Witold Abramowicz (eds.)
En conferencia: 10º International Conference on Business Information Systems (BIS) . Poznań, Poland . April 25, 2007 - April 27, 2007
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Information Systems Applications (incl. Internet); IT in Business; Information Storage and Retrieval; Data Mining and Knowledge Discovery; Computers and Society; Management of Computing and Information Systems
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2007 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-72034-8
ISBN electrónico
978-3-540-72035-5
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2007
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2007
Cobertura temática
Tabla de contenidos
Context-Awareness in Mobile Service Meets Fine Location Estimate
Tomohisa Yamashita; Daisuke Takaoka; Noriaki Izumi; Akio Sashima; Koichi Kurumatani; Kôiti Hasida
In this paper, to tackle with uncertainty in the real world, the light-weight ontology drive approach is proposed for the realization of context dependent services. We concentrate on position information and an operation history, as a user’s context, and develop our location-aware content delivery system. The evaluation experiment of our location estimate engine is performed in Akihabara Software Showcase at Information Technology Research Institute. Furthermore, through the proofing experiment in Expo 2005 Aichi, our proposed architecture is confirmed to enables us to realize the real world application of context dependency. Finally, we compare our location-aware content delivery system and related researches, and discus the advantage of our system.
- Agents And Mobile Applications | Pp. 522-535
Adaptive Fuzzy Inventory Control Algorithm for Replenishment Process Optimization in an Uncertain Environment
Davorin Kofjač; Miroljub Kljajić; Andrej Škraba; Blaž Rodič
This paper presents a real case study of warehouse replenishment process optimization on a selected sample of representative materials. Optimization is performed with simulation model supported by inventory control algorithms. The adaptive fuzzy inventory control algorithm based on fuzzy stock-outs, highest stock level and total cost is introduced. The algorithm is tested and compared to the simulation results of the actual warehouse process and classic inventory control algorithms such as Least-unit cost, Part period balancing and Silver-Meal algorithm. The algorithms are tested on historic data and assessed using the Fuzzy Strategy Assessor (FSA). Simulation results are presented and advantages of fuzzy inventory control algorithm are discussed.
- Decision Support | Pp. 536-548
Post Decision-Making Analysis of the Reengineering Process Supported by Simulation Methods
Miroljub Kljajić; Andrej Škraba; Mirjana Kljajić Borštnar; Edvard Kolmanič
This paper analyzes seven years of experience in a concrete production company where reengineering was conducted by employing simulation methodology and AHP methods for decision support. A predictive validation of the simulation model as well as evaluation of the simulation methodology for decision assessment in enterprises was performed by comparing real and expected values. Multiple criteria methods for the simulation scenario selection were applied. The basic advantage of the described approach lies in the interactivity and transparency of the model representation, which is essential for model acceptance by user. The achieved results represent scholars’ example of using simulation methodology for solving managerial problems.
- Decision Support | Pp. 549-561
Contextual Classifier Ensembles
Janina Anna Jakubczyc
Individual classifiers do not always yield satisfactory results. In the field of data mining, failures are mainly thought to be caused by the limitations inherent in the data itself, which stem from different reasons for creating data files and their various applications. One of the proposed ways of dealing with these kinds of shortcomings is to employ classifier ensembles. Their application involves creating a set of models for the same data file or for different subsets of a specified data file. Although in many cases this approach results in a visible increase of classification accuracy, it considerably complicates, or, in some cases, effectively hinders interpretation of the obtained results. The reasons for this are the methods of defining learning tasks which rely on randomizing. The purpose of this paper is to present an idea for using data contexts to define learning tasks for classifier ensembles. The achieved results are promising.
- Decision Support | Pp. 562-569
An Algebraic Algorithm for Structural Validation of Social Protocols
Willy Picard
Support for human-to-human interactions over a network is still insufficient. In this paper a model for human-to-human collaboration based on the concept of social protocol is presented and formalized. Then, semantical and structural validity of social protocols is defined. Next, an algebraic representation of social protocols is proposed. Based on this algebraic representation of social protocols, an algorithm for structural validation of social protocols is proposed and illustrated by three examples.
- Social Issues | Pp. 570-583
Long Tails and Analysis of Knowledge Worker Intranet Browsing Behavior
Peter Géczy; Noriaki Izumi; Shotaro Akaho; Kôiti Hasida
We present a formal approach to analysis of human browsing behavior in electronic spaces. An analysis of knowledge workers’ interactions on a large corporate intranet have revealed that users form repetitive elemental and complex browsing patterns, use narrow spectrum of resources, and exhibit diminutive exploratory behavior. Knowledge workers had well defined targets and accomplished their browsing tasks via few subgoals. The analyzed aspects of browsing behavior exposed significant long tail characteristics that can be accurately modeled by the introduced novel distribution. The long tail behavioral effects present new challenges and opportunities for business information systems.
- Social Issues | Pp. 584-597
A Trustworthy Email System Based on Instant Messaging
Wenmao Zhang; Jun Bi; Miao Zhang; Zheng Qin
Email service is a killer application in the Internet. Due to the problem of SPAM, building a trustworthy and secure email service is an important research topic. This paper presents a new email system called SureMsg, which is based on Extensible Messaging and Presence Protocol (XMPP). In addition to the security mechanism provided by XMPP, a reputation mechanism is also designed for SureMsg. Therefore, SureMsg enhances the user authentication and is feasible for current Email service transition.
- Social Issues | Pp. 598-609
Towards Operationalizing Strategic Alignment of IT by Usage of Software Engineering Methods
Bernd Tilg; Joanna Chimiak-Opoka; Chris Lenz; Ruth Breu
This paper presents an enterprise–modelling oriented approach to IT Governance. Main requirements for a IT Governance Framework are presented and applicability is shown by means of operationalizing Strategic Alignment — a main focus area of IT Governance. Two frameworks are briefly described, namely PROSA (domain-specific for Strategic Business Alignment) and the general–purpose framework SQUAM for metamodelling, enterprise modelling and model-analysis. Key aspects of this approach are the information enrichment of enterprise models (mainly with key figures) and the integration into a Business Intelligence Suite for comprehensive business analysis.
- Specific MIS Issues | Pp. 610-625
A Modelling Approach for Dynamic and Complex Capacities in Production Control Systems
Wilhelm Dangelmaier; Benjamin Klöpper; Thorsten Timm; Daniel Brüggemann
In this paper we introduce some aspects of the development process of a production planning tool for a leading European car manufacturer. In this project we had to face a gap between theoretical problem definition in manufacturing planning and control and the actual requirements of the dispatcher. Especially the determination of production capacities and product processing times was a severe problem. The software system had to support the derivation of these important variables from shift plans, factory calendars and exceptional events. In order to implement this we defined a formal model that is a combination of the theoretical and practical view on manufacturing problem. The allows the dispatcher to provide up-to-date information in an easier way then provided by standard ERP systems about the production systems and transfers the information automatically to planning algorithms. Thus the production planning and control is always performed on the most recent information.
- Specific MIS Issues | Pp. 626-637
Product Line Architecture for RFID-Enabled Applications
Mikyeong Moon; Keunhyuk Yeom
Radio Frequency Identification (RFID) is an established technology and has the potential, in a variety of applications, to significantly reduce cost and improve performance. RFID may dramatically change an organization’s capacity to obtain real-time information concerning the location and properties of tagged people or objects. However, simply adding RFID to an existing process is a losing proposition. The entire process should be reconsidered in order to take advantage of real-time inventory data and the near real-time tracking and management of inventory. As RFID-enabled applications will fulfill similar tasks across a range of processes adapted to use the data gained from RFID tags, they can be considered as software products derived from a common infrastructure and assets that capture specific abstractions in the domain. That is, it may be appropriate to design RFID-enabled applications as elements of a product line. This paper discusses product line architecture for RFID-enabled applications. In developing this architecture, common activities are identified among the RFID-enabled applications and the variability in the common activities is analyzed in detail using variation point concepts. A product line architecture explicitly representing commonality and variability is described using UML activity diagrams. Sharing a common architecture and reusing assets to deploy recurrent services may be considered an advantage in terms of economic significance and overall quality.
- Specific MIS Issues | Pp. 638-651