105 resultados para Exception Handling, Context Awareness, Flexibility, Workflow Management
em CentAUR: Central Archive University of Reading - UK
Resumo:
Managing a construction project supply chain effectively and efficiently is extremely difficult due to involvement of numerous sectors that are supported by ineffective communication system. An efficient construction supply chain system ensures the delivery of materials and other services to construction site while minimising costs and rewarding all sectors based on value added to the supply chain. The advancement of information, communication and wireless technologies is driving construction companies to deploy supply chain management strategies to seek better outputs. As part of the emerging wireless technologies, contextaware computing capability represents the next generation of ICT to the construction services. Conceptually, context-awareness could be integrated with Web Services in order to ensure the delivery of pertinent information to construction site and enhance construction supply chain collaboration. An initial study has indicated that this integrated system has the potential of serving and improving the construction services delivery through access to context-specific data, information and services on as-needed basis.
Resumo:
With an aging global population, the number of people living with a chronic illness is expected to increase significantly by 2050. If left unmanaged, chronic care leads to serious health complications, resulting in poor patient quality of life and a costly time bomb for care providers. If effectively managed, patients with chronic care tend to live a richer and more healthy life, resulting in a less costly total care solution. This chapter considers literature from the areas of technology acceptance and care self-management, which aims to alleviate symptoms and/or reason for non-acceptance of care, and thus minimise the risk of long-term complications, which in turn reduces the chance of spiralling health expenditure. By bringing together these areas, the chapter highlights areas where self-management is failing so that changes can be made in care in advance of health deterioration.
Resumo:
The context of construction management (CM) reveals that this method of procurement is as much a management philosophy as a contract structure. It is important to consider legal and contractual issues in this context. The interplay between management and law is complex and often misunderstood. Before considering specific issues, the use of contractual remedies in business agreements is discussed. In addition, the extent to which standardising a form of contract detracts or contributes to the success of projects is also considered. The dearth of judicial decisions, and the lack of a standard form, render it difficult to be specific about legal issues. Therefore, the main discussion of legal issues is centred around a recently completed research project which involved eliciting the views of a cross-section of experienced construction management clients, consultants and trade contractors. These interviews are used as the basis for highlighting some of the most important legal points to consider when setting up CM projects. The interviews revealed that the advantage of CM is the proximity of the client to the trade contractors and the disadvantage is that it depends on a high degree of professionalism and experience; qualities which are unfortunately difficult to find in the UK construction industry.
Resumo:
Purpose – The purpose of this paper is to focus on the intellectual property (IP) aspects of mergers and acquisitions (M&A) transactions. Design/methodology/approach – A holistic approach is proposed that embraces IP as an integral part of the M&A process in the form of a roadmap for the strategic and purposeful management of IP assets in M&A deals. Findings – Addressing IP issues in transactions in isolation can lead to undesirable consequences (e.g. considerable costs for unplanned purchases of rights). IP due diligence and IP integration project processes can be automated using collaborative software solutions. Thereby, risk can be reduced through the creation of a high level of transparency and predefined responsibilities. Practical implications – Although the proposed IP management framework is based on intellectual property matters relevant to German jurisdiction, conclusions derived and the proposed roadmap are transferable to other jurisdictions and hence have a broader relevance. Evidence for this is provided by the successful application of the roadmap in the context of the multinational transaction stated above. Originality/value – This paper is based on the authors' collective experience, insight and reflected observation of M&A practice gained in advisory M&A roles in management consultancies over a period of more than a decade. The paper summarizes the authors' reflections and observations and brings these into the context of the current management literature. Moreover, this paper builds on earlier published research.
Resumo:
Reclaimed water provides an important contribution to the water balance in water-scarce Jordan, but the quality of this water presents both benefits and challenges. Careful management of reclaimed water is required to maximize the nutrient benefits while minimizing the salinity risks. This work uses a multi-disciplinary research approach to show that soil response to irrigation with reclaimed water is a function of the management strategies adopted on the farm by the water user. The adoption of management methods to maintain soil productivity can be seen to be a result of farmers’ awareness to potentially plant-toxic ions in the irrigation water (70% of Jordan Valley farmers identified salinization as a hazard from irrigation with reclaimed water). However, the work also suggests that farmers’ management capacity is affected by the institutional management of water. About a third (35%) of farmers in the Jordan Valley claimed that their ability to manage salinization was limited by water shortages. Organizational interviews revealed that institutional awareness of soil management challenges was quite high (34% of interviewees described salinization as a risk from water reuse), but strategies to address this challenge at the institutional level require greater development.
Resumo:
There has been a clear lack of common data exchange semantics for inter-organisational workflow management systems where the research has mainly focused on technical issues rather than language constructs. This paper presents the neutral data exchanges semantics required for the workflow integration within the AXAEDIS framework and presents the mechanism for object discovery from the object repository where little or no knowledge about the object is available. The paper also presents workflow independent integration architecture with the AXAEDIS Framework.
Resumo:
Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in building automation, healthcare and agriculture. In the EU project Hydra1 highlevel security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios especially in the user domains of building automation, healthcare, and agriculture. This paper gives a short introduction to the Hydra project, its user domains and its approach to ensure security by design. Based on the results of a focus group analysis of the building automation domain typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta Model. How concepts such as context security, semantic security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of a technical building automation scenario.
Resumo:
This paper provides a new set of theoretical perspectives on the topic of value management in building procurement. On the evidence of the current literature it is possible to identify two distinct methodologies which are based on different epistemological positions. An argument is developed which sees these two methodologies to be complementary. A tentative meta-methodology is then outlined for matching methodologies to different problem situations. It is contended however that such a meta-methodology could never provide a prescriptive guide. Its usefulness lies in the way in which it provides the basis for reflective practice. Of central importance is the need to understand the problem context within which value management is to be applied. The distinctions between unitary, pluralistic and coercive situations are seen to be especially significant.
Resumo:
Previously, governments have responded to the impacts of economic failures and consequently have developed more regulations to protect employees, customers, shareholders and the economic wellbeing of the state. Our research addresses how Accounting Information Systems (AIS) may act as carriers for institutionalised practices associated with maintaining regulatory compliance within the context of UK Asset Management Houses. The AIS was found to be a strong conduit for institutionalized compliance related practices, utilising symbolic systems, relational systems, routines and artefacts to carry approaches relating to regulative, normative and cultural-cognitive strands of institutionalism. Thus, AIS are integral to the development and dissipation of best practice for the management of regulatory compliance. As institutional elements are clearly present we argue that AIS and regulatory compliance provide a rich context to further institutionalism. Since AIS may act as conduits for regulatory approaches, both systems adopters and clients may benefit from actively seeking to codify and abstract best practices into AIS. However, the application of generic institutionalized approaches, which may be applied across similar organizations, must be tempered with each firm’s business environment and associated regulatory exposure. A balance should be sought between approaches specific enough to be useful but generic enough to be universally applied.
Resumo:
Background: In many experimental pipelines, clustering of multidimensional biological datasets is used to detect hidden structures in unlabelled input data. Taverna is a popular workflow management system that is used to design and execute scientific workflows and aid in silico experimentation. The availability of fast unsupervised methods for clustering and visualization in the Taverna platform is important to support a data-driven scientific discovery in complex and explorative bioinformatics applications. Results: This work presents a Taverna plugin, the Biological Data Interactive Clustering Explorer (BioDICE), that performs clustering of high-dimensional biological data and provides a nonlinear, topology preserving projection for the visualization of the input data and their similarities. The core algorithm in the BioDICE plugin is Fast Learning Self Organizing Map (FLSOM), which is an improved variant of the Self Organizing Map (SOM) algorithm. The plugin generates an interactive 2D map that allows the visual exploration of multidimensional data and the identification of groups of similar objects. The effectiveness of the plugin is demonstrated on a case study related to chemical compounds. Conclusions: The number and variety of available tools and its extensibility have made Taverna a popular choice for the development of scientific data workflows. This work presents a novel plugin, BioDICE, which adds a data-driven knowledge discovery component to Taverna. BioDICE provides an effective and powerful clustering tool, which can be adopted for the explorative analysis of biological datasets.
Resumo:
Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in different domains. In the EU project Hydra high-level security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the. Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios. This paper gives a short introduction to the Hydra project and its approach to ensure security by design. Based on the results of a focus group analysis of the user domain "building automation" typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta-Model. How concepts such as context, semantic resolution of security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of it technical building automation scenario.
Resumo:
Following the US model, the UK has seen considerable innovation in the funding, finance and procurement of real estate in the last decade. In the growing CMBS market asset backed securitisations have included $2.25billion secured on the Broadgate office development and issues secured on Canary Wharf and the Trafford Centre regional mall. Major occupiers (retailer Sainsbury’s, retail bank Abbey National) have engaged in innovative sale & leaseback and outsourcing schemes. Strong claims are made concerning the benefits of such schemes – e.g. British Land were reported to have reduced their weighted cost of debt by 150bp as a result of the Broadgate issue. The paper reports preliminary findings from a project funded by the Corporation of London and the RICS Research Foundation examining a number of innovative schemes to identify, within a formal finance framework, sources of added value and hidden costs. The analysis indicates that many of the gains claimed conceal costs – in terms of market value of debt or flexibility of management – while others result from unusual firm or market conditions (for example utilising the UK long lease and the unusual shape of the yield curve). Nonetheless, there are real gains resulting from the innovations, reflecting arbitrage and institutional constraints in the direct (private) real estate market
Resumo:
Modern transaction cost economics (TCE) thinking has developed into a key intellectual foundation of international business (IB) research, but the Williamsonian version has faced substantial criticism for adopting the behavioral assumption of opportunism. In this paper we assess both the opportunism concept and existing alternatives such as trust within the context of IB research, especially work on multinational enterprise (MNE) governance. Case analyses of nine global MNEs illustrate an alternative to the opportunism assumption that captures more fully the mechanisms underlying failed commitments inside the MNE. As a substitute for the often-criticized assumption of opportunism, we propose the envelope concept of bounded reliability (BRel), an assumption that represents more accurately and more completely the reasons for failed commitments, without invalidating the other critical assumption in conventional TCE (and internalization theory) thinking, namely the widely accepted envelope concept of bounded rationality (BRat). Bounded reliability as an envelope concept includes two main components, within the context of global MNE management: opportunism as intentional deceit, and benevolent preference reversal. The implications for IB research of adopting the bounded reliability concept are far reaching, as this concept may increase the legitimacy of comparative institutional analysis in the social sciences.
Resumo:
In this article, we review the state-of-the-art techniques in mining data streams for mobile and ubiquitous environments. We start the review with a concise background of data stream processing, presenting the building blocks for mining data streams. In a wide range of applications, data streams are required to be processed on small ubiquitous devices like smartphones and sensor devices. Mobile and ubiquitous data mining target these applications with tailored techniques and approaches addressing scarcity of resources and mobility issues. Two categories can be identified for mobile and ubiquitous mining of streaming data: single-node and distributed. This survey will cover both categories. Mining mobile and ubiquitous data require algorithms with the ability to monitor and adapt the working conditions to the available computational resources. We identify the key characteristics of these algorithms and present illustrative applications. Distributed data stream mining in the mobile environment is then discussed, presenting the Pocket Data Mining framework. Mobility of users stimulates the adoption of context-awareness in this area of research. Context-awareness and collaboration are discussed in the Collaborative Data Stream Mining, where agents share knowledge to learn adaptive accurate models.