The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In Software-as-a-Service, multiple tenants are typically consolidated into the same database instance to reduce costs. For analytics-as-a-service, in-memory column databases are especially suitable because they offer very short response times. This paper studies the automation of operational tasks in multi-tenant in-memory column database clusters. As a prerequisite, we develop a model for predicting...
The use of RFID technology for anti-counterfeiting involves complex event processing, which exceeds the current state of the art of product tracking and tracing implementations. The use of RFID requires storing good related events for anti-counterfeiting in a distributed way by each handling party individually. We define a formal approach for modeling of data entities, events, and operations that...
In RFID-aided supply chains captured location-based event data is stored in distributed repositories. Performing anti-counterfeiting involves checks on the good's path in the supply chain. The path is reconstructed by querying corresponding event data from distributed repositories. The object name service performs lookups of relevant event repositories in EPCglobal networks. Attacking the lookup process...
Agile software development processes are widely adopted in software engineering projects. Their low organizational overhead and iterative nature make them ideal choices for small development teams. The application of those methods in software projects that require collaboration between multiple sub-teams is a challenging task that remains subject to intensive research. Especially the initial phases...
Traditionally, enterprise data management is divided into separate systems. Online Transaction Processing (OLTP) systems are focused on the day to day business by being optimized for retrieving and modifying complete entities. Online Analytical Processing (OLAP) systems initiate queries on specific attributes as these applications are optimized to support decision making based on the information gathered...
The emerging trend towards smart grids defines new requirements for designing enterprise applications for the energy market. Current solutions were built to process single billing runs as time-consuming batch jobs. Rather than processing some readings per year and household, a constant stream of meter readings has to be processed in context of a smart power grid. Additionally, consumers demand for...
A number of governments and organizations around the world agree that the first step to address national and international problems such as energy independence, global warming or emergency resilience, is the redesign of electricity networks, known as Smart Grids. Typically, power grids have "broadcasted" power from generation plants to large population of consumers on a suboptimal way. Nevertheless,...
Enterprise applications are presently built on a 20-year old data management infrastructure that was designed to meet a specific set of requirements for OLTP systems. In the meantime, enterprise applications have become more sophisticated, data set sizes have increased, requirements on the freshness of input data have been strengthened, and the time allotted for completing business processes has been...
This work is devoted to the development of models and algorithms for purchase planning problem. For accurate and flexible purchasing it is important to be able to effectively combine input data from various types of sources. This paper proposes a method based on fuzzy sets to solve the problem of effective exploitation of expert knowledge and statistics of demand to determine the optimal amount of...
The diffusion of RFID technology continues using the Electronic Product Code (EPC) as unique identifier for physical objects. The EPC Network enables companies to share information about read events by defining EPC Information Services (EPCIS). The communication protocols in the EPC Network are defined to be XML and SOAP. We claim that a binary encoded communication protocol is more appropriate given...
The pharmaceutical industry suffers increasingly from product counterfeits. Although RFID technology can be used as a basis for an integer and counterfeit-resistant pharmaceutical supply chain, the total costs of ownership are hardly specified. We define specific levels of security and corresponding fields of operation to value privacy of customers and supply chain participants. Our contribution defines...
Efficiency in data manipulation is of vital importance to ERP systems. A Flexible data manipulation application programming interface (API) helps to address a number of acute needs of application developers and eventually end users. Building on the notions of business objects and Web services, this paper contributes the design and implementation of a business object query language (BOQL). Essentially,...
Although the achievements of EPCglobal standardization efforts in the last years are substantial and the diffusion of the EPCglobal network continues, a service to access item-level information stored at potentially unknown supply chain partners is still missing. Without this 'Discovery Service' the EPCglobal network cannot be used with unknown business partners. In this contribution we present a...
Along with benefits of ERP system companies experience high costs associated to them. Setting up and maintaining the infrastructure and adjusting standard ERP software to a specific customers requirements drive the costs of such systems. To lower the total cost of ownership companies employ software as a service (SaaS) paradigm: instead of owning software they subscribe to it. However, this does not...
Globally distributed engineering teams face particular challenges regarding collaboration and communication. Spatial, temporal and cultural distances force a virtual cooperation that must adequately enable idea mediation and decision making within engineering teams. Thus, the engineering management plays a central role and therefore has to react to support and govern those teams. On this perspective,...
Enterprise applications are presently built on a 20 year old data management infrastructure that was designed to meet a specific set of requirements for OLTP systems. In the meantime, enterprise applications have become more sophisticated, data set sizes have increased, requirements on the freshness of input data have been strengthened, and the time allotted for completing business processes has been...
In the field of OLAP and data warehousing, column stores and compressed main-memory data storage technology have successfully been implemented in products that enable a significant speed improvement of analytical queries with special performance requirements. We could soon see the majority of analytical workloads move to such main-memory based systems. Having one specialized OLAP DBMS explicitly aimed...
In our contribution, we present the results of our research on the use of Near Field Communication (NFC) for user authentication and document control. To show our results, we present two different scenarios and a combination of them. In the first scenario, NFC tags are embedded in documents of an office environment. This includes customer invoices which are archived or kept in paper form as well as...
RFID technology has been adopted in the market. It is used in large enterprises for different approaches with great success. The rise of RFID technology is still at its beginning and there is a lot of unused potential, especially concerning the so called long tail. To achieve the full value of supply chain networks the SMEs have to introduce RFID technology at their side, too. The idea behind Software...
The use of RFID tags for storing unique identifiers increases the complexity of existing global supply chains. Companies participating in this RFID-aided supply chains are confronted with new challenges by using RFID technology. Most RFID tags contain no sophisticated data protection mechanisms, because they are primarily designed to be cheap and to carry a very limited amount of data. This lack of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.