821 resultados para 0806 Information Systems


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In many advanced applications, data are described by multiple high-dimensional features. Moreover, different queries may weight these features differently; some may not even specify all the features. In this paper, we propose our solution to support efficient query processing in these applications. We devise a novel representation that compactly captures f features into two components: The first component is a 2D vector that reflects a distance range ( minimum and maximum values) of the f features with respect to a reference point ( the center of the space) in a metric space and the second component is a bit signature, with two bits per dimension, obtained by analyzing each feature's descending energy histogram. This representation enables two levels of filtering: The first component prunes away points that do not share similar distance ranges, while the bit signature filters away points based on the dimensions of the relevant features. Moreover, the representation facilitates the use of a single index structure to further speed up processing. We employ the classical B+-tree for this purpose. We also propose a KNN search algorithm that exploits the access orders of critical dimensions of highly selective features and partial distances to prune the search space more effectively. Our extensive experiments on both real-life and synthetic data sets show that the proposed solution offers significant performance advantages over sequential scan and retrieval methods using single and multiple VA-files.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Prior studies have shown that innovative information systems (IS) adoption behaviour by small-and medium-sized enterprises (SMEs) is greatly dependent on organizational and environmental characteristics. Government influence (i.e., federal and local government agencies) was found to play an important role in the promotion or enforcement of innovative IS adoption by SMEs, and it is vital for ensuring adoption of nationwide innovative IS, particularly in developing economies. This study introduces the construct of enacted capabilities and examines the enacted capabilities that motivate SMEs to use innovative IS (i.e., a government's electronic procurement systems) to its full potential. A model of how enacted capabilities affect IS adoption behaviour through perceived net benefits and attitude is developed. A survey (and follow-up interviews) of CEOs/owners from Malaysian SMEs was conducted. Results indicate the enacted capabilities possessed by SMEs play a prominent role in determining the adoption of government electronic procurement systems by these enterprises.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Workflow technology has delivered effectively for a large class of business processes, providing the requisite control and monitoring functions. At the same time, this technology has been the target of much criticism due to its limited ability to cope with dynamically changing business conditions which require business processes to be adapted frequently, and/or its limited ability to model business processes which cannot be entirely predefined. Requirements indicate the need for generic solutions where a balance between process control and flexibility may be achieved. In this paper we present a framework that allows the workflow to execute on the basis of a partially specified model where the full specification of the model is made at runtime, and may be unique to each instance. This framework is based on the notion of process constraints. Where as process constraints may be specified for any aspect of the workflow, such as structural, temporal, etc. our focus in this paper is on a constraint which allows dynamic selection of activities for inclusion in a given instance. We call these cardinality constraints, and this paper will discuss their specification and validation requirements.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The roiling financial markets, constantly changing tax law and increasing complexity of planning transaction increase the demand of aggregated family wealth management (FWM) services. However, current trend of developing such advisory systems is mainly focusing on financial or investment side. In addition, these existing systems lack of flexibility and are hard to be integrated with other organizational information systems, such as CRM systems. In this paper, a novel architecture of Web-service-agents-based FWM systems has been proposed. Multiple intelligent agents are wrapped as Web services and can communicate with each other via Web service protocols. On the one hand, these agents can collaborate with each other and provide comprehensive FWM advices. On the other hand, each service can work independently to achieve its own tasks. A prototype system for supporting financial advice is also presented to demonstrate the advances of the proposed Webservice- agents-based FWM system architecture.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research-in-progress paper utilizes the Technology Acceptance Model (TAM) to assess the effects of National Culture, Infrastructure, and Access Costs on the adoption of Wireless Technologies in Australia. The cultural dimensions emanating from the GLOBE project were chosen because of their broad coverage and contemporary nature. Australia is unique in that it has one of the lowest population densities in the world. The provision of wireless technologies is challenging in such an environment, and I believe the model developed in this research will have applicability in other similarly populated countries.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research-in-progress paper utilizes the Technology Acceptance Model (TAM) to determine whether differences exist in the adoption of Instant Messaging (IM) Technologies in Australia, China, Mexico and the USA. Despite significant differences in the technology needed to implement IM (e.g., software supporting Chinese language characters), few barriers exist to the adoption of IM given the environment is in place. We postulate that language interface technology, infrastructure, and culture affect the adoption of IM technology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Conceptual modeling forms an important part of systems analysis. If this is done incorrectly or incompletely, there can be serious implications for the resultant system, specifically in terms of rework and useability. One approach to improving the conceptual modelling process is to evaluate how well the model represents reality. Emergence of the Bunge-Wand-Weber (BWW) ontological model introduced a platform to classify and compare the grammar of conceptual modelling languages. This work applies the BWW theory to a real world example in the health arena. The general practice computing group data model was developed using the Barker Entity Relationship Modelling technique. We describe an experiment, grounded in ontological theory, which evaluates how well the GPCG data model is understood by domain experts. The results show that with the exception of the use of entities to represent events, the raw model is better understood by domain experts

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In today’s financial markets characterized by constantly changing tax laws and increasingly complex transactions, the demand for family financial planning (FFP) services is rising dramatically. However, the current trend to develop advisory systems that focus mainly on the financial or investment side fails to consider the whole picture of FFP. Separating financial or investment advice from legal and accounting advice may result in conflicting advice or important omissions that could lead to users suffering financial loss. In this paper, we propose a conceptual model for FFP decision-making process, followed by a novel architecture to support an aggregated FFP decision process by utilizing intelligentagents and Web-services technology. A prototype system for supporting FFP decision is presented to demonstrate the advances of the proposed Web-service multi-agentsbased system architecture and business value.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Even when data repositories exhibit near perfect data quality, users may formulate queries that do not correspond to the information requested. Users’ poor information retrieval performance may arise from either problems understanding of the data models that represent the real world systems, or their query skills. This research focuses on users’ understanding of the data structures, i.e., their ability to map the information request and the data model. The Bunge-Wand-Weber ontology was used to formulate three sets of hypotheses. Two laboratory experiments (one using a small data model and one using a larger data model) tested the effect of ontological clarity on users’ performance when undertaking component, record, and aggregate level tasks. The results indicate for the hypotheses associated with different representations but equivalent semantics that parsimonious data model participants performed better for component level tasks but that ontologically clearer data model participants performed better for record and aggregate level tasks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we consider the co-evolutionary dynamics of IS engagement where episodic change of implementation increasingly occurs within the context of linkages and interdependencies between systems and processes within and across organisations. Although there are many theories that interpret the various motors of change be it lifecycle, teleological, dialectic or evolutionary, our paper attempts to move towards a unifying view of change by studying co-evolutionary dynamics from a complex systems perspective. To understand how systems and organisations co-evolve in practice and how order emerges, or fails to emerge, we adopt complex adaptive systems theory to incorporate evolutionary and teleological motors, and actor-network theory to incorporate dialectic motors. We illustrate this through the analysis of the implementation of a novel academic scheduling system at a large research-intensive Australian university.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Management of collaborative business processes that span multiple business entities has emerged as a key requirement for business success. These processes are embedded in sets of rules describing complex message-based interactions between parties such that if a logical expression defined on the set of received messages is satisfied, one or more outgoing messages are dispatched. The execution of these processes presents significant challenges since each contentrich message may contribute towards the evaluation of multiple expressions in different ways and the sequence of message arrival cannot be predicted. These challenges must be overcome in order to develop an efficient execution strategy for collaborative processes in an intensive operating environment with a large number of rules and very high throughput of messages. In this paper, we present a discussion on issues relevant to the evaluation of such expressions and describe a basic query-based method for this purpose, including suggested indexes for improved performance. We conclude by identifying several potential future research directions in this area. © 2010 IEEE. All rights reserved

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Our research described in this paper identifies a three part premise relating to the spyware paradigm. Firstly the data suggests spyware is proliferating at an exponential rate. Secondly ongoing research confirms that spyware produces many security risks – including that of privacy/confidentiality breaches via illicit data collection and reporting. Thirdly, anti-spyware controls are improving but are still considered problematic for several reasons. Our research then concludes that control measures to counter this very significant challenge should merit compliance auditing – and this auditing may effectively target the vital message passing performed by all illicit data collection spyware. Our research then evolves into an experiment involving the design and implementation of a software audit tool to conduct the desired compliance auditing. The software audit tool is positioned at the protected network’s gateway. The software audit tool uses ‘phone-home’ IP addresses as spyware signatures to detect the presence of the offending software. The audit tool also has the capability to differentiate legitimate message passing software from that produced by spyware – and ‘learn’ both new spyware signatures and new legitimate message passing profiles. The testing stage of the software has proven successful – albeit using very limited levels of network message passing variety and frequency.