The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an approach to estimating fungibility between skills given multiple information sources of those skills. An estimate of skill adjacency or fungibility or substitutability is critical for effective capacity planning, analytics and optimization in the face of changing skill requirements of an organization. The proposed approach is based on computing a similarity measure between skills,...
Development of document processing systems is considered. The direction of transition to the object-associated electronic document management systems is shown. The assessment of correlation of control of processes of relocation of documents and change of objects in the distributed large-scale systems is carried out.
It is described the concepts of recommender system and virtual creative team and their characteristics. It is also analyzed the functional features of developed automated system, called “Information assistant of a scientist” that provides information search and storage which is relevant to research topics of creative research team in the field of e-science.
Every organization is information driven and it's the employee who drives and carries out day to day activities. The P&A department train the people, organizes them, so that employees can effectively perform these activities. This requires viewing people as human assets, not costs to the organization. Looking at people as assets is part of human resource management and human capital management...
The Great East Japan Earthquake, which occurred in March 2011, damaged information infrastructure. Latest researches showed that some parts of communication networks are available even immediately after the earthquake. Therefore, connections among the different available parts of communication networks can keep communication quality for damaged areas at disasters. Recently, “Software-Defined Networking...
A kind of descriptor for depicting the Point Cloud Structure is Carlsson's 1D-Barcode. This paper puts forward a brand new Point Cloud Descriptor: 2D-Barcode, which promotes the Barcode's dimension from 1 to 2 and results in containing much more structure information and visible. By proposing a new method of constructing the relationships among the organization based on the content instead of correspond,...
This paper outlines the steps in the creation and maintenance of a new dataset listing leaders of the various projects of the Apache Software Foundation (ASF). Included in this dataset are different levels of committers to the various ASF project code bases, as well as regular and emeritus members of the ASF, and directors and officers of the ASF. The dataset has been donated to the FLOSSmole project...
In multifarious information platforms, the request for security is becoming more and more important. So using secure and credible authentication mode to enhance security of system is very significant. Firstly, this paper introduces the LDAP and JBoss, then analyses the theory and characteristics of authentication mode based on those, finally it summarizes the strongpoint of this mode.
The immense progress in Information Technology has accelerated its use in the domains of management. In the fields of academic publishing too, it has had its great influence. With the advent of the client-server based models of computing and the World Wide Web, the whole process merely reduces to typing out the document on the computer, a series of mouse clicks and receiving information via email...
This paper presents a detailed analysis of the demographic factors associated with Personal Health Record (PHR) feature use among patients of a large, integrated healthcare organization. The organization's population data was examined and the demographic characteristics and PHR feature utilization patterns of the patients were evaluated. Results show that feature use varies significantly by gender,...
Support analytics (i.e., statistical analysis, modeling and mining of customer/operations support tickets data) is important in service industries. In this paper, we adopt a domain-driven data mining approach to support analytics with a focus on IT infrastructure Support (ITIS) services. We identify specific business questions and then propose algorithms for answering them. The questions are: (1)...
A simple and intuitive model to mine an email transactions log for significant messages and users is presented. No use is made of NLP or semantic analysis. The model is based only on scoring messages and users from a graph-theoretic analysis of the communication pattern represented in the transaction log. Practical experiments indicate the potential of the model.
This paper gives an analysis of participants' decision-making process about information-sharing in rail transit projects by mathematical model and the measures should be taken into information-sharing strategy from the perspective of the entire life cycle. On this basis, the path for information sharing in project is put forward.
Discovering the relationships among data resources in dataspace is an important issue, which is the basis for creating index, browsing, searching, querying, lineage and other services.However current researches mostly focus on the assumption that the relationships among data resources have been obtained, so they have more or less limitation. In order to solve this problem we propose an approach to...
Nowadays software systems are more and more complex. Such systems are composed of many sub-systems, in which each sub-system exists and interacts with other subsystems. Since a few years, multiagent systems (MAS) propose well considered approaches for these kinds of systems. In this paper, we concentrate on recursive MAS which are well adapted to describe complex systems. Up to now, recursive MAS...
It is widely known that the email system forms a social network. Analysis of email networks reveals properties similar to classic social networks such as friendship or academic collaboration networks. Like other social networks, the properties observed in email networks are the result of patterns of human social behavior rather than the underlying technology. Hence, email social network properties...
Phishing is a wide spread and rapidly evolving form of electronic identity theft that attempts to gather personally identifying information from unwitting victims, often through social engineering. The ldquoclassicrdquo phishing attack starts with a ldquolurerdquo (unsolicited e-mail) that directs recipients to a fraudulent Web site that appears to be that of a well-known company, government agency,...
Today companies are dealing with rapid and discontinuous changes, where technological achievements, information and knowledge are drivers for business success. In that chaotic world companies have been struggling with the dissipation of company knowledge. That costs companies thousands of dollars and delays the completion of work. Knowledge is a mix of experience, values, information, applied in the...
Identity and access management (IAM) architectures address the problem of managing the life-cycle of identities and of controlling users' daily operations and interactions with IT services in today's organizations. The huge impact of IAM projects on the business processes and the heterogeneity and variety of environments where they take place raise the need to investigate how modern software tools...
In resent years, many companies engender fraudulences and affairs, and affront several crises. Such situations are defined as risks and are classified with some parts and hierarchies. Low-leveled risk does not relate with company management directly, however, it sometimes develops the high-leveled risk, such as the company bankruptcy and the matter of controversy. Studies on risk management attract...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.