The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper puts forward a knowledge push method which is based on multidimensional hierarchical context model for general business process, and constructs a multi-dimensional hierarchical model of business process and a context driven knowledge resource database model, which emphasizes the mapping relation between knowledge and the knowledge context. On this basis, a framework of the knowledge push...
Online marketplaces are e-commerce websites where thousands of products are provided by multiple third parties. There are dozens of these differently structured marketplaces that need to be visited by the end users to reach their targets. This searching process consumes a lot of time and effort; moreover it negatively affects the user experience. In this paper, extensive analysis and evaluation of...
Filtering and finding items of interest in large volumes of data, such as products in an e-commerce application or invoices in an ERP web platform can be a burdensome task, either for novice users that do not have insights on how the data is modeled or for those users who are already accustomed to the used system, but usually their filtering needs are significantly more complex. Natural language processing...
The Northbound Interface (NBI) plays a crucial role in promoting the adoption of SDN as it allows developers the freedom of developing their revenue-generating applications without being affected and constrained by the complexities of the underlying networks. To do so the NBI has to allow applications to express their requirements and constraints in their own application specific language, and the...
Currently, the fast rate of population growth in urban areas are putting a big pressure in services supply. In order to fulfil citizens' demands, the cities' operations need to be intelligently optimized. All around the world cities are implementing smart cities initiatives to address this challenge. The development of smart initiatives implies the adoption of solutions that heavily rely on Information...
Knowledge-intensive business services (KIBS) such as management consulting, research and development, and IT outsourcing, have become a key component of most industrialized economies. As such, there has been a growing number of empirical studies investigating the way in which KIBS providers, clients, and partners collaboratively create value. These studies provide an important opportunity to improve...
In this paper, we focus on the exception handling mechanism of CA-CCML (Context-aware Cooperative Composition Modeling Language). First, according to level of exception generation, we divide Web service exceptions into three broad categories by levels of exception generation, which are Service invocation level exception, Syntax level exception and Semantic level exception. Then we make detail classification...
Mining frequent patterns is a crucial task in data mining. Most of the existing frequent pattern mining methods find the complete set of frequent patterns from a given dataset. However, in real-life scenarios we often need to predict the future frequent patterns for different tasks such as business policy making, web page recommendation, stock-market behavior and road traffic analysis. Predicting...
This case study compares two different technologies - model-driven development (MDD) and aspect-oriented programming (AOP) - both trying to avoid redundant code, but with very different approaches. A real industrial software system, the OpenSOA platform, which had already applied a model-driven XML/XSL-T approach, is used as the basis for implementation and comparison. For evaluation purpose, we have...
Users of online review sites can benefit from knowing the profiles of the businesses, as well as the profiles of reviewers who reviewed the businesses. This paper describes crisp and fuzzy metaclustering techniques to evolve two recursively defined clustering schemes of both businesses and reviewers in parallel using a real-world dataset supplied by yelp.com. The objective is to profile the businesses...
As software consumption is shifting to mobile platforms, enterprises are looking for efficient ways to reuse their existing legacy systems by exposing their functionalities as services. Mining services from legacy code is therefore an important problem for the enterprises. In this paper we present a technique for mining service candidates from the database applications. Central to our mining technique...
Enterprise applications are difficult to test because their intended functionality is either not described precisely enough or described in cumbersome business rules. It takes a lot of effort on the part of a test architect to understand all the business rules and design tests that "cover" them, i.e., exercise all their constituent scenarios. Part of the problem is that it takes a complicated...
Conventional top-k spatial keyword queries require users to explicitly specify their preferences between spatial proximity and keyword relevance. In this work we investigate how to eliminate this requirement by enhancing the conventional queries with interaction, resulting in Interactive Top-k Spatial Keyword (ITkSK) query. Having confirmed the feasibility by theoretical analysis, we propose a three-phase...
An important omission in current development practice for business process (or workflow) management systems is modeling of data & access for a business process, including relationship of the process data and the persistent data in the underlying enterprise database(s). This paper develops and studies a new approach to modeling data for business processes: representing data used by a process as...
The business analyst role was established in response to concerns about a 'gap' between technical IT staff and users. Such a 'gap' has been implicated in the failure of information systems to consistently deliver business value. However research suggests that while business analysts may facilitate the relationship between technical staff and business users, boundaries may still occur between business...
Extensibility is a key requirement in modern software applications. In the context of business applications it is one of the major selection criteria from the customer perspective. However, there are some challenges concerning the specification and enforcement of extension interfaces. Extension interfaces define the resources of the base applications that are allowed to be extended, where and when...
Spreadsheets are being used with many different purposes that range from toy applications to complete information systems. In any of these cases, they are often used as data repositories that can grow significantly. As the amount of data grows, it also becomes more difficult to extract concrete information out of them. This paper focuses on the problem of spreadsheet querying. In particular, we propose...
Based on analysis of mobile tourism users' multi-dimensional feature, the concept of context is introduced into user model modeling of mobile tourism. From the perspective of user and context, context theory and machine learning is used to accomplish user modeling in terms of tourism activities recommendation. The dimension of this model includes history behavior, current context, historical context...
The paper presents an idea of a context-aware application, which collects context data from many different sources, stores them in a dedicated database and makes use of it to support flexible scenarios for end users. Using open APIs it integrates different types of context information provided by: Unified Communication system, APIs exposed by communication service providers and information from Machine...
Cloud services allow for hosting applications partially or completely in the Cloud by migrating their components and data. Especially with respect to data migration, a series of functional and non-functional challenges like data confidentiality arise when considering private and public Cloud data stores. In this paper we identify some of these challenges and propose a set of reusable solutions focusing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.