The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In previous work, code smells have been adapted to be applicable on spreadsheet formulas. The smell detection algorithm used in this earlier study was validated on a small dataset of industrial spreadsheets by interviewing the users of these spreadsheets and asking them about their opinion about the found smells. In this paper a more in depth validation of the algorithm is done by analyzing a set...
With the commercial value of open services gradually reflected, major Internet companies have all launched their own open platform strategies to attract more third-party developers. In this paper, we design a third-party developers auditing system, which helps to achieve better management of all the developers. This system is build based on Open API (Application Programming Interface) in order to...
Software Development for Automotive Systems is becoming more and more complex. Cars are turned into software intensive and to some extent software defined products by the increasing functionality of the various electronic control units (ECUs). Major driving factors for this development are complex human-machine-interfaces (HMI), eMobility and autonomous driving. Consequently, developing the software...
Risk handling and evaluation plays an importantrole in optimizing an investment portfolio. This paper's goal isto describe a system that determines, classifies and handles riskassociated to any type of investment based on sentiment analysis, price movement, information related to companies, certain characteristics, the traders confidence level, and by measuring thepotential loss over a certain period...
This paper suggests a model to measure e-visibility — the e-Visibility Maturity Model (e-VM model) that is used to assess the visibility of a company or set of companies in the global e-business market. The visibility is measured using company's involvement in electronic interactions with customers that is externalized by the integration of the Social Software (SoS) in its other means of online presence...
Process mining is a modern family of techniques applied to datasets generated from business processes run in organizations, in order to improve and obtain useful insights and performance measurements on the processes themselves (with clear societal and economical benefits). While these techniques are very promising in understanding business processes, their complete and efficient implementation inside...
The pharmaceutical supply chain in the United States of America (USA) is getting complicated and is often not controllable due to a globally open market, increasing online market, and many illegal activities. Some consumers who cannot afford to buy high priced genuine products are tempted by easily accessible counterfeit drugs on illegal web site pharmacies in or out of the USA. Corrupt participants...
Many previous researches have analyzed the Business Ecosystem that is consisted by the platforms and complementary products. Besides, the technological aspects of the business ecosystem were relatively not analyzed. Based on this recognition, we examined the relationship between complementary products providers' technological adoption and evolution of the business ecosystem. We focused on the ecosystem...
Firms that participate in a patent transactions network are interdependent. The characteristics of a network include the complexity of the overall configuration. This work presents a dynamic approach to studying the structure of a patent transactions network. Network analysis is used to define the structural configuration of a patent transactions network based on its centralization, centrality, and...
Knowledge is typically created within one unit of a company and then transferred through contact persons (“knowledge brokers”) to the other units. There are four main types of participants in the knowledge transfer process: sender, broker, broker's boss, and the other unit members. Transferring knowledge and promoting its utilization to all members in a hierarchical organization is not easy. A key...
Board governance is at the core of the corporate governance, to establish a standard and reasonable structure is the important content of perfecting corporate governance mechanism. Board governance in China is in its infancy, the listed company's board of directors' governance situation is worrying, problems like the unreasonable structure, lack of effective incentive, insufficient supervision and...
Smart Grid companies are looking for communication infrastructure to support remote control, automation, and monitoring. But, these companies are not fully confident in budding LTE technology for M2M (Machine-to-Machine) applications, although it has been proved to be a promising technology for H2H (Human-to-Human) communications. LTE MTC (Machine Type Communications) is a part of the upcoming release...
Industry needs further development of methodologies and models for analyzing cascading outages. • Cascading outages need to be analyzed in both steady state and transient domain. • Practical approaches need to fully simulate protective relays operation • Models need to incorporate RAS and operating procedures into the analysis • Improve visualisation and decision support tools to reduce human error...
The German working committee for “Industrie 4.0” identified the horizontal integration throughout value networks and the vertical integration of networked manufacturing systems as key issues in the context of smart factories. For this purpose we aim for a universal model-driven industrial engineering framework spanning over production chains and value networks. Thereby, we build up on the Resource...
The number of detected and analyzed Advanced Persistent Threat (APT) campaigns increased over the last years. Two of the main objectives of such campaigns are to maintain long-term access to the environment of the target and to stay undetected. To achieve these goals the attackers use sophisticated and customized techniques for the lateral movement, to ensure that these activities are not detected...
Opinion shopping has attracted extensive researches in accounting. There have been the changes of auditors to achieve the improvement of audit opinion or opinion shopping in practice. Regulators are also highly concerned about audit opinion shopping. However, the results of empirical researches have not yielded a consistent conclusion. The conventional wisdom in the literature focused on the single...
Building company-wide safety programs to overcome the challenges of multiple plants, multiple regions, differing standards and differing technologies in the forest products industry.
This paper selects the data of listed companies in Shanghai stock exchange and Shenzhen stock exchange between 2010 and 2013, studying the moderating effect of management team characteristics on the relationship between equity incentive and internal control quality. The result shows that there is a significant positive correlation between equity incentive and internal control quality. Also, education...
Scientific computing over the Web can be applied to solve problems of many types, namely as appear in the activity of companies. In this study, the computation is done with two remote servers, without the user's perception, thus disclosing no clues on the computation. As an illustration, we make use of random sampling, which is needed in many activities, such as manufacture and research. Sampling...
The modes of supply chain finance are concrete embodiments of supply chain finance. Supply chain finance of property control is one of supply chain finance. First, this article analyses the structure of supply chain finance mode. Second, the characteristics of supply chain finance mode are discussed. Thirdly, the modes of supply chain finance of property control are studied. Finally, defensive measures...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.