The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
By investigating the current situation of university library's digital and informational development, this paper analyzes the opportunities and challenges brought by cloud computing technology to the development of libraries. Two strategies of renting cloud services and building cloud platform are put forward to realize the cloud computing service of Digital Library in big data environment.
As more commercial services are offered and provided on-line, tools to analyse their socio-economic impact are also needed. For instance, new services such as Spotify, Uber and AirBnB have been able to disrupt different sectors because they rely on combining new business models together with information and communication technology (ICT). For (traditional) enterprises, however, launching that kind...
At present, bots are still in their preliminary stages of development. Many are relatively simple, or developed ad-hoc for a very specific use-case. For this reason, they are typically programmed manually, or utilize machine-learning classifiers to interpret a fixed set of user utterances. In reality, real world conversations with humans require support for dynamically capturing users expressions...
The increasing complexity of modern Large-Scale systems and System-of-Systems (SoSs) makes their design and development extremely challenging. To face this difficulty new Modeling and Simulation techniques, methods, and tools are emerging and some of them take advantage of distributed simulation environments. In this context, the IEEE 1516-2010 - High Level Architecture (HLA) is a well-known and accepted...
This paper gives a brief overview of the International Workshop on Vocabularies, Ontologies and Rules for the Enterprise (VORTE) held at EDOC 2017. The paper introduces the workshop series' research topics and presents this year's program
Despite the great benefits of cloud computing on businesses, some organizations have had to withdraw from its service due to incomplete compliance to conditions from standards, bodies, or Service Level Agreements which have led to their being penalized. A structured and efficient model is helpful to aid small and medium scale enterprises (SMSEs) utilize cloud services safely and ascertain their fitting...
System specifications can be modeled using various types of notations and diagrams regarding applications of the particular model. In this paper, we present an overview of the existing solutions, focusing on UML, BPMN and DMN models and the diagrams provided by these notations. We perform a comparison of these approaches and provide examples of representing system requirements in these notations.
This paper presents a new approach for identifying unknown and/or unwanted states within a system of systems (SoS) architecture using a graphical representation of the event-based modeling language, Monterey Phoenix. The paper demonstrates how the graphical modeling tool can create a single model that contains a mix of human, system, and environmental events, all of which contain event attributes...
Cloud based technology heavily changed the way how Enterprise Resource Planning (ERP) systems are handled through the whole lifecycle. The previous release-by-release driven by main version change (from pre-alpha to gold release) was developed into a continuous release management. Business processes although remained the same, but how can be determined, which part of the software needs to remain untouched,...
Failure in cloud system is defined as an even that occurs when the delivered service deviates from the correct intended service. As the cloud computing systems continue to grow in scale and complexity, there is an urgent need for cloud service providers (CSP) to guarantee a reliable on-demand resource to their customers in the presence of faults thereby fulfilling their service level agreement (SLA)...
Nowadays, with the rapid development of information technology, many business fields gradually usher in the era of big data. Extracting valuable information from the large data is very urgent. However, because of some limitations such as memory restrictions, data complexity or time complexity, the majority of traditional data mining methods are time consuming and low efficiency working on big data...
Maintainability and easy-to-customisation are some quality properties that most application software in software-as-a-service (SaaS) should posses. These quality attributes are the pre requisite for most application software running on cloud and serving several clients with diverse requirements. It is a challenge on how to implement, manage, and monitor client-specific customisation of functions of...
In online social networks, people may want to make new friends to maximize their social influences. For example, business page owners on Facebook want to influence as many people as possible for commercial advantages. Hence, we study a friend recommendation strategy with the perspective of social influence maximization. For the system provider (e.g., Facebook), the objective is to recommend a fixed...
This paper investigates the impact of the database layer on the scaling actions of the business layer of a 3-tier web service system in cloud resource provisioning. The research question is "What is the impact of the database layer on the business layer auto-scaling decisions?" In this work two hypotheses are tested: 1) "Database tier capacity has no effect on the business tier scaling...
Workflow management system (WfMS) should be capable of self-autonomous non-function attributes to experience its resilience to the change of runtime environment in Business Process Management (BPM) domain. With the motivation mentioned above, we propose the resilience mechanism for WfMS, associating with the corresponding methods proposed in our early research work, engaging to achieve our final aim,...
Enterprise architecture supports enterprise transformation through model-based holistic descriptions that capture and share the knowledge, concepts, and relationships representing the enterprise. Although enterprise architecture models portray the gap between the as-is and to-be enterprise, they disregard the underlying aspects that together enact enterprise transformation. This paper proposes an...
Along with the globalization of business, the opportunities and challenges in franchise business are increased. In order to ensure that the franchise industry grows stably, it has been always an important topic to forecast the franchise performance accurately. Thus, this study aims at utilizing Grey prediction as an analyze methodology to estimate the performance of US's franchise industry in order...
The use of services computing technology provides support to the development of modern services industries. Services computing utilizes and implements computing technology to develop IT services systems that are capable of supporting and developing services innovation. This condition motivates the organization to be able to present the services computing systems in the form of IT services systems...
This paper has proposed a formal verification of ABAP by Z specification. An ABAP programming language is used to create a customized program in SAP ERP. The program must satisfy a business requirement. It likely has a defect from the developed program. Since a specification is created as the business requirement and a program should have functioned as in the specification, the formal verification...
The ability to proactively monitor business processes is one of the main differentiators for firms to remain competitive. Process execution logs generated by Process Aware Information Systems (PAIS) help to make various business process specific predictions. This enables a proactive situational awareness related to the execution of business processes. The goal of the approach proposed in the current...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.