Author: Christian Dörner
Publisher: BoD – Books on Demand
ISBN: 3899369475
Category : Computers
Languages : en
Pages : 190
Book Description
Today's non-tayloristic work environments call for flexible work practices supported by dynamic IT systems. Changing and optimising business processes has become an important 'adaptation mechanism' in this context. However, process models cannot capture every conceivable real-life situation, and firms' software infrastructures often do not provide the flexibility required for supporting 'design-in-use' through effective tailoring processes. The involvement of business users in the continuous redesign of business processes is a beneficial solution for these problems, as it enhances decision processes by making specific information available more quickly. However, involving business users in these redesign processes requires specific design tools. This book presents the development of an environment that enables business users to independently model business processes and workflows. The environment reduces the technical skills required for modelling business processes and workflows to enable business users to tailor heterogeneous software infrastructures. It also provides improved documentation facilities. The facilities add usage-related information about Web services to the existing functional metadata, which is already included in current Web service standards and workflow modelling tools. The environment enables business users to create this usage-related information cooperatively, which leads to a domain-specific documentation of Web services. Based on this information, it provides an enhanced search system that identifies related services and service functions. The evaluation of the environment showed that users had a positive perception of modelling business processes and workflows. They considered this to be useful for the visualisation and automation of business processes as well as for the creation of calculations since it could enhance the efficiency and efficacy of their work.
Tailoring Software Infrastructures
Author: Christian Dörner
Publisher: BoD – Books on Demand
ISBN: 3899369475
Category : Computers
Languages : en
Pages : 190
Book Description
Today's non-tayloristic work environments call for flexible work practices supported by dynamic IT systems. Changing and optimising business processes has become an important 'adaptation mechanism' in this context. However, process models cannot capture every conceivable real-life situation, and firms' software infrastructures often do not provide the flexibility required for supporting 'design-in-use' through effective tailoring processes. The involvement of business users in the continuous redesign of business processes is a beneficial solution for these problems, as it enhances decision processes by making specific information available more quickly. However, involving business users in these redesign processes requires specific design tools. This book presents the development of an environment that enables business users to independently model business processes and workflows. The environment reduces the technical skills required for modelling business processes and workflows to enable business users to tailor heterogeneous software infrastructures. It also provides improved documentation facilities. The facilities add usage-related information about Web services to the existing functional metadata, which is already included in current Web service standards and workflow modelling tools. The environment enables business users to create this usage-related information cooperatively, which leads to a domain-specific documentation of Web services. Based on this information, it provides an enhanced search system that identifies related services and service functions. The evaluation of the environment showed that users had a positive perception of modelling business processes and workflows. They considered this to be useful for the visualisation and automation of business processes as well as for the creation of calculations since it could enhance the efficiency and efficacy of their work.
Publisher: BoD – Books on Demand
ISBN: 3899369475
Category : Computers
Languages : en
Pages : 190
Book Description
Today's non-tayloristic work environments call for flexible work practices supported by dynamic IT systems. Changing and optimising business processes has become an important 'adaptation mechanism' in this context. However, process models cannot capture every conceivable real-life situation, and firms' software infrastructures often do not provide the flexibility required for supporting 'design-in-use' through effective tailoring processes. The involvement of business users in the continuous redesign of business processes is a beneficial solution for these problems, as it enhances decision processes by making specific information available more quickly. However, involving business users in these redesign processes requires specific design tools. This book presents the development of an environment that enables business users to independently model business processes and workflows. The environment reduces the technical skills required for modelling business processes and workflows to enable business users to tailor heterogeneous software infrastructures. It also provides improved documentation facilities. The facilities add usage-related information about Web services to the existing functional metadata, which is already included in current Web service standards and workflow modelling tools. The environment enables business users to create this usage-related information cooperatively, which leads to a domain-specific documentation of Web services. Based on this information, it provides an enhanced search system that identifies related services and service functions. The evaluation of the environment showed that users had a positive perception of modelling business processes and workflows. They considered this to be useful for the visualisation and automation of business processes as well as for the creation of calculations since it could enhance the efficiency and efficacy of their work.
Software Applications: Concepts, Methodologies, Tools, and Applications
Author: Tiako, Pierre F.
Publisher: IGI Global
ISBN: 1605660612
Category : Computers
Languages : en
Pages : 3618
Book Description
Includes articles in topic areas such as autonomic computing, operating system architectures, and open source software technologies and applications.
Publisher: IGI Global
ISBN: 1605660612
Category : Computers
Languages : en
Pages : 3618
Book Description
Includes articles in topic areas such as autonomic computing, operating system architectures, and open source software technologies and applications.
Process Patterns
Author: Scott W. Ambler
Publisher: Cambridge University Press
ISBN: 9780521645683
Category : Computers
Languages : en
Pages : 574
Book Description
Written by one of the best known object-oriented practitioners in the business, Process Patterns is based on proven, real-world techniques. Scott Ambler shows readers how to successfully deliver large-scale applications using object technology and carefully describes how one develops applications that are truly easy to maintain and to enhance. He shows how such projects can be supported and points out what is necessary to ensure that one's development efforts are of the best quality. His object-oriented software process (OOSP) is geared toward medium to large-size organizations that need to internally develop software to support their main line of business. Developers and project managers who have just taken their first OO development course will find this book essential. It describes the only OOSP to take the true needs of development into consideration, including cross-project, maintenance, operations, and support issues. This book uses the Unified Modeling Language (UML).
Publisher: Cambridge University Press
ISBN: 9780521645683
Category : Computers
Languages : en
Pages : 574
Book Description
Written by one of the best known object-oriented practitioners in the business, Process Patterns is based on proven, real-world techniques. Scott Ambler shows readers how to successfully deliver large-scale applications using object technology and carefully describes how one develops applications that are truly easy to maintain and to enhance. He shows how such projects can be supported and points out what is necessary to ensure that one's development efforts are of the best quality. His object-oriented software process (OOSP) is geared toward medium to large-size organizations that need to internally develop software to support their main line of business. Developers and project managers who have just taken their first OO development course will find this book essential. It describes the only OOSP to take the true needs of development into consideration, including cross-project, maintenance, operations, and support issues. This book uses the Unified Modeling Language (UML).
Ada: Moving Towards 2000
Author: Jan Katwijk
Publisher: Springer Science & Business Media
ISBN: 9783540555858
Category : Computers
Languages : en
Pages : 340
Book Description
Software engineering and the language Ada are playing a major role in the development of software and software technology for the new century. The11th Ada Europe conference shows that Ada has matured from a language, mainly of researchers and academics in the early 1980s, into a full-grown tool in software engineering practice. This volume contains a selection of contributions to the conference. They demonstrate that Ada is very beneficially used in many software development projects and is gradually becoming accepted on the scale it deserves. Papers have been selected that show that Ada is indeed ripened in all aspects of software engineering. A variety of topics is addressed: management, economics, practical experiences, numerics, and the use of Ada for real-time and distributed systems.
Publisher: Springer Science & Business Media
ISBN: 9783540555858
Category : Computers
Languages : en
Pages : 340
Book Description
Software engineering and the language Ada are playing a major role in the development of software and software technology for the new century. The11th Ada Europe conference shows that Ada has matured from a language, mainly of researchers and academics in the early 1980s, into a full-grown tool in software engineering practice. This volume contains a selection of contributions to the conference. They demonstrate that Ada is very beneficially used in many software development projects and is gradually becoming accepted on the scale it deserves. Papers have been selected that show that Ada is indeed ripened in all aspects of software engineering. A variety of topics is addressed: management, economics, practical experiences, numerics, and the use of Ada for real-time and distributed systems.
End-User Computing: Concepts, Methodologies, Tools, and Applications
Author: Clarke, Steve
Publisher: IGI Global
ISBN: 1599049465
Category : Computers
Languages : en
Pages : 2491
Book Description
Covers the important concepts, methodologies, technologies, applications, social issues, and emerging trends in this field. Provides researchers, managers, and other professionals with the knowledge and tools they need to properly understand the role of end-user computing in the modern organization.
Publisher: IGI Global
ISBN: 1599049465
Category : Computers
Languages : en
Pages : 2491
Book Description
Covers the important concepts, methodologies, technologies, applications, social issues, and emerging trends in this field. Provides researchers, managers, and other professionals with the knowledge and tools they need to properly understand the role of end-user computing in the modern organization.
Army RD & A.
Author:
Publisher:
ISBN:
Category : Military research
Languages : en
Pages : 736
Book Description
Professional publication of the RD & A community.
Publisher:
ISBN:
Category : Military research
Languages : en
Pages : 736
Book Description
Professional publication of the RD & A community.
Army RD & A Bulletin
Author:
Publisher:
ISBN:
Category : Military research
Languages : en
Pages : 64
Book Description
Publisher:
ISBN:
Category : Military research
Languages : en
Pages : 64
Book Description
Groupware: Design, Implementation, and Use
Author: Hugo Fuks
Publisher: Springer
ISBN: 3540320024
Category : Computers
Languages : en
Pages : 388
Book Description
This book constitutes the refereed proceedings of the 11th International Workshop on Groupware, CRIWG 2005, held in Porto de Galinhas, Brazil in September 2005. The 16 revised full papers and 13 revised short papers presented together with a keynote paper were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on groupware development, collaborative applications, workflow management, knowledge management, computer supported collaborative learning, group decision support systems, mobile collaborative work, and work modeling in CSCW.
Publisher: Springer
ISBN: 3540320024
Category : Computers
Languages : en
Pages : 388
Book Description
This book constitutes the refereed proceedings of the 11th International Workshop on Groupware, CRIWG 2005, held in Porto de Galinhas, Brazil in September 2005. The 16 revised full papers and 13 revised short papers presented together with a keynote paper were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on groupware development, collaborative applications, workflow management, knowledge management, computer supported collaborative learning, group decision support systems, mobile collaborative work, and work modeling in CSCW.
ECSCW 2015: Proceedings of the 14th European Conference on Computer Supported Cooperative Work, 19-23 September 2015, Oslo, Norway
Author: Nina Boulus-Rødje
Publisher: Springer
ISBN: 3319204998
Category : Computers
Languages : en
Pages : 317
Book Description
This volume presents the proceedings of ECSCW 2015, the 14th European Conference on Computer Supported Cooperative Work, organized by the University of Oslo, Norway. The conference provides a venue for exploring novel, open and critical approaches to the multidisciplinary nature of social and collaborative technologies and work practices, critically reviewing new and established theories and research, forever committed to high scientific standards, both theoretical and methodological. These proceedings consist of 14 full and 3 exploratory papers, which reflect the lively debate currently ongoing within the CSCW field, focusing on work and enterprise and the challenges of involving various types of people like citizens, patients and software developers into collaborative settings. The blurring boundaries between home and work are explored and recent and emergent new technologies supporting collaborative work are introduced. With contributions from all over the world, the chapters provide interesting perspectives, helping to focus the European perspective within the CSCW community. This collection will be of interest to researchers and practitioners alike as it combines an understanding of the nature of technology within both the workplace and wider society
Publisher: Springer
ISBN: 3319204998
Category : Computers
Languages : en
Pages : 317
Book Description
This volume presents the proceedings of ECSCW 2015, the 14th European Conference on Computer Supported Cooperative Work, organized by the University of Oslo, Norway. The conference provides a venue for exploring novel, open and critical approaches to the multidisciplinary nature of social and collaborative technologies and work practices, critically reviewing new and established theories and research, forever committed to high scientific standards, both theoretical and methodological. These proceedings consist of 14 full and 3 exploratory papers, which reflect the lively debate currently ongoing within the CSCW field, focusing on work and enterprise and the challenges of involving various types of people like citizens, patients and software developers into collaborative settings. The blurring boundaries between home and work are explored and recent and emergent new technologies supporting collaborative work are introduced. With contributions from all over the world, the chapters provide interesting perspectives, helping to focus the European perspective within the CSCW community. This collection will be of interest to researchers and practitioners alike as it combines an understanding of the nature of technology within both the workplace and wider society
AI, Machine Learning and Deep Learning
Author: Fei Hu
Publisher: CRC Press
ISBN: 1000878899
Category : Computers
Languages : en
Pages : 420
Book Description
Today, Artificial Intelligence (AI) and Machine Learning/ Deep Learning (ML/DL) have become the hottest areas in information technology. In our society, many intelligent devices rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms and tools have been used in many internet applications and electronic devices, they are also vulnerable to various attacks and threats. AI parameters may be distorted by the internal attacker; the DL input samples may be polluted by adversaries; the ML model may be misled by changing the classification boundary, among many other attacks and threats. Such attacks can make AI products dangerous to use. While this discussion focuses on security issues in AI/ML/DL-based systems (i.e., securing the intelligent systems themselves), AI/ML/DL models and algorithms can actually also be used for cyber security (i.e., the use of AI to achieve security). Since AI/ML/DL security is a newly emergent field, many researchers and industry professionals cannot yet obtain a detailed, comprehensive understanding of this area. This book aims to provide a complete picture of the challenges and solutions to related security issues in various applications. It explains how different attacks can occur in advanced AI tools and the challenges of overcoming those attacks. Then, the book describes many sets of promising solutions to achieve AI security and privacy. The features of this book have seven aspects: This is the first book to explain various practical attacks and countermeasures to AI systems Both quantitative math models and practical security implementations are provided It covers both "securing the AI system itself" and "using AI to achieve security" It covers all the advanced AI attacks and threats with detailed attack models It provides multiple solution spaces to the security and privacy issues in AI tools The differences among ML and DL security and privacy issues are explained Many practical security applications are covered
Publisher: CRC Press
ISBN: 1000878899
Category : Computers
Languages : en
Pages : 420
Book Description
Today, Artificial Intelligence (AI) and Machine Learning/ Deep Learning (ML/DL) have become the hottest areas in information technology. In our society, many intelligent devices rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms and tools have been used in many internet applications and electronic devices, they are also vulnerable to various attacks and threats. AI parameters may be distorted by the internal attacker; the DL input samples may be polluted by adversaries; the ML model may be misled by changing the classification boundary, among many other attacks and threats. Such attacks can make AI products dangerous to use. While this discussion focuses on security issues in AI/ML/DL-based systems (i.e., securing the intelligent systems themselves), AI/ML/DL models and algorithms can actually also be used for cyber security (i.e., the use of AI to achieve security). Since AI/ML/DL security is a newly emergent field, many researchers and industry professionals cannot yet obtain a detailed, comprehensive understanding of this area. This book aims to provide a complete picture of the challenges and solutions to related security issues in various applications. It explains how different attacks can occur in advanced AI tools and the challenges of overcoming those attacks. Then, the book describes many sets of promising solutions to achieve AI security and privacy. The features of this book have seven aspects: This is the first book to explain various practical attacks and countermeasures to AI systems Both quantitative math models and practical security implementations are provided It covers both "securing the AI system itself" and "using AI to achieve security" It covers all the advanced AI attacks and threats with detailed attack models It provides multiple solution spaces to the security and privacy issues in AI tools The differences among ML and DL security and privacy issues are explained Many practical security applications are covered