561 resultados para dynamic causal modeling


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The integrated and process oriented nature of Enterprise Systems (ES) has led organizations to use process modeling as an aid in managing these systems. Enterprise Systems success factor studies explicitly and implicitly state the importance of process modeling and its contribution to overall Enterprise System success. However, no empirical evidence exists on how to conduct process modeling successfully and possibly differentially in the main phases of the ES life-cycle. This paper reports on an empirical investigation of the factors that influence process modeling success. An a-priori model with 8 candidate success factors has been developed to this stage. This paper introduces the research context and objectives, describes the research design and the derived model, and concludes by looking ahead to the next phases of the research design.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Service-Oriented Architectures (SOAs), software systems are decomposed into independent units, namely services, that interact with one another through message exchanges. To promote reuse and evolvability, these interactions are explicitly described right from the early phases of the development lifecycle. Up to now, emphasis has been placed on capturing structural aspects of service interactions. Gradually though, the description of behavioral dependencies between service interactions is gaining increasing attention as a means to push forward the SOA vision. This paper deals with the description of these behavioral dependencies during the analysis and design phases. The paper outlines a set of requirements that a language for modeling service interactions at this level should fulfill, and proposes a language whose design is driven by these requirements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Business process modeling has undoubtedly emerged as a popular and relevant practice in Information Systems. Despite being an actively researched field, anecdotal evidence and experiences suggest that the focus of the research community is not always well aligned with the needs of industry. The main aim of this paper is, accordingly, to explore the current issues and the future challenges in business process modeling, as perceived by three key stakeholder groups (academics, practitioners, and tool vendors). We present the results of a global Delphi study with these three groups of stakeholders, and discuss the findings and their implications for research and practice. Our findings suggest that the critical areas of concern are standardization of modeling approaches, identification of the value proposition of business process modeling, and model-driven process execution. These areas are also expected to persist as business process modeling roadblocks in the future.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We investigate the potential for the third-order aberrations coma and trefoil to provide a signed cue to accommodation. It is first demonstrated theoretically (with some assumptions) that the point spread function is insensitive to the sign of spherical defocus in the presence of odd-order aberrations. In an experimental investigation, the accommodation response to a sinusoidal change in vergence (1–3 D, 0.2 Hz) of a monochromatic stimulus was obtained with a dynamic infrared optometer. Measurements were obtained in 10 young visually normal individuals with and without custom contact lenses that induced low and high values of r.m.s. trefoil (0.25, 1.03 μm) and coma (0.34, 0.94 μm). Despite variation between subjects, we did not find any statistically significant increase or decrease in the accommodative gain for low levels of trefoil and coma, although effects approached or reached significance for the high levels of trefoil and coma. Theoretical and experimental results indicate that the presence of Zernike third-order aberrations on the eye does not seem to play a crucial role in the dynamics of the accommodation response.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper explores how game authoring tools can teach processes that transform everyday places into engaging learning spaces. It discusses the motivation inherent in playing games and creating games for others, and how this stimulates an iterative process of creation and reflection and evokes a natural desire to engage in learning. The use of MiLK at the Adelaide Botanic Gardens is offered as a case in point. MiLK is an authoring tool that allows students and teachers to create and share SMS games for mobile phones. A group of South Australian high school students used MiLK to play a game, create their own games and play each other’s games during a day at the gardens. This paper details the learning processes involved in these activities and how the students, without prompting, reflected on their learning, conducted peer assessment, and engaged in a two-way discussion with their teacher about new technologies and their implications for learning. The paper concludes with a discussion of the needs and requirements of 21st century learners and how MiLK can support constructivist and connectivist teaching methods that engage learners and will produce an appropriately skilled future workforce.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.