The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose Inference Knowledge Graph, a novel approach of remapping existing, large scale, semantic knowledge graphs into Markov Random Fields in order to create user goal tracking models that could form part of a spoken dialog system. Since semantic knowledge graphs include both entities and their attributes, the proposed method merges the semantic dialog-state-tracking of attributes and the database...
The emerging growth and evolution of web based systems and services make the job of audit professionals a complicated and time-consuming one for many enterprises. In this context, continuous process auditing (CPA) systems in the form of audit-as-a-service (AaaS) emerges as an inexpensive and effective approach. A CPA system helps to satisfy process auditing needs and recommendations in the context...
Enterprise applications are difficult to test because their intended functionality is either not described precisely enough or described in cumbersome business rules. It takes a lot of effort on the part of a test architect to understand all the business rules and design tests that "cover" them, i.e., exercise all their constituent scenarios. Part of the problem is that it takes a complicated...
In the modern retailing industry, many enterprise resource planning (ERP) systems are considered legacy software systems that have become too expensive to replace and too costly to re-engineer. Countering the need to maintain and extend the business value of these systems is the need to do so in the simplest, cheapest, and least risky manner available. There are a number of approaches used by software...
Conventional top-k spatial keyword queries require users to explicitly specify their preferences between spatial proximity and keyword relevance. In this work we investigate how to eliminate this requirement by enhancing the conventional queries with interaction, resulting in Interactive Top-k Spatial Keyword (ITkSK) query. Having confirmed the feasibility by theoretical analysis, we propose a three-phase...
We review how the state of information technology has evolved for consumers vs. enterprises. We discuss some of the key challenges in enterprise search over structured data and suggest a few promising directions for the research community.
Over the years, data management has diversified and moved into multiple directions, mainly caused by a significant growth in the application space with different usage patterns, a massive change in the underlying hardware characteristics, and-last but not least-growing data volumes to be processed. A solution matching these constraints has to cope with a multidimensional problem space including techniques...
Companies are found increasingly confronted with problems related to the integration of applications in an information system (IS), and the interconnection of the system itself with other information systems. One of The model driven engineering's (MDE) objectives is to provide solutions to the difficulties of interoperability between business systems. MDE has also provided several significant improvements...
With the emergence of Big Data, the use of NoSQL (Not only SQL) technology is rising rapidly among internet companies and other enterprises. Benefits include simplicity of design, horizontal scaling and finer control over availability. NoSQL databases are increasingly considered a viable alternative to relational databases, as more organizations recognize that its schema less data model is a better...
The world behaves in a manner showing similarity in responses to various actions, this similarity in behavior needs to be tapped. This phenomenon is called Collective Behavior. Collective behavior is the like or similar response of the members of a society to a given stimulus or suggestion. The study of collective behavior can also be applied for the college campus environment. The system developed...
With the growing importance of external and shared data, the set of requirements for Business Intelligence and Analytics (BIA) is shifting. Current solutions still come with shortcomings, esp. In multi-stakeholder environments where sensitive content is exchanged. We argue that a new level in the evolution of BIA can be unlocked by tearing down the barriers between storage and computing based on upcoming...
Phishing is one of the most common attacks on the networks today and a primary enabler for fraud and identity theft, and the increasing sophistication of the phishers makes it very difficult for users to distinguish between genuine and fake. Thus, it is important to mutually authenticate each other. The mutual authentication between two entities is essential to establish a secure link over public/closed...
With the appearance of computer network, could computing, the internet of things, big data more and more get the attention of people. Understanding and Application big data, and make a scientific decision, become the most necessary and urgent problem. Big data, not only let the database have always been known for efficient and secure storage embarrassed, but also allow the data warehouse that provide...
In this paper we investigate the problem of providing web service interception hooks while maintaining consistency, high availability and durability for Web Service transactions. We consider ways of adding runtime configurable interception hooks for after release customization while guaranteeing the correctness of the entire transaction. We study integration hooks that offer an opportunity for optimization...
There is a high demand from academic centers, business firms and marketplaces for highly qualified expertise in database areas. As a result, it is undoubtedly fundamental for academic researchers in the field of databases and education to conduct more research works so that to enhance teaching, learning, and assessing methods of database courses. This paper describes the salient features of these...
A serious challenge that confronts multitenant service systems is finding an optimized deployment strategy according to their business scale and operating characteristics. The tenants want to rent high performance services and services providers demand minimizing cost at the same time of meeting the requirements of tenants. But there are often contradictions between high performance and low cost....
In this paper, we address the problem of transition of IT operations from one service provider to another. We present analytics-driven solutions to generate a transition plan while addressing various aspects such as coverage, risk, time, and cost. We model the IT operations through graphs and use the well defined problems in graph theory to build solutions for transition planner. We demonstrate the...
In many modern systems, applications or services are realized as compositions of multiple existing services that can be enacted by Service Composition Engines (SCEs), which provide the required functionality to enable their definition and execution. SCEs typically use the capabilities of an Enterprise Service Bus (ESB) which serves as the messaging hub between the composed services aiming at ensuring...
Software as a Service (SaaS) providers can serve thousands of customers, which have hundreds of thousands of overlapping requirements, using a single application instance to offer service at a lower price. Even with a potentially large number of customers with varying requirements, a multitenant application should make co-tenancy transparent to the tenants, which means that every tenant must appear...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.