Figure 10(b) presents the Recall/Precision of the PMRF, iSeM logic-based and SPARQLent. This figure shows that PMRF recall is significantly better than both ...
Author: Valérie Monfort
This book constitutes revised selected papers from the 12th International Conference on Web Information Systems and Technologies, WEBIST 2016, held in Rome, Italy, April 23-25, 2016, organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC). The purpose of the WEBIST series of conferences is to bring together researches, engineers and practitioners interested in technological advances and business applications of web-based information systems. The 9 full papers presented in this volume were carefully reviewed and selected originally 123 paper submissions. They contribute to the understanding of relevant trends of current research on Web Information Systems and Technologies, comprising recommender systems, sentiment analysis, ranking, and Web applications and Web architecture.
Acustica 85, 78–87 (1999) S. Ise, M. Toyodaet, S. Enomoto, S. Nakamura, An attempt of sound field sharing system for profound communication–concept and ...
Author: Toyoaki Nishida
Going from the philosophy and concepts to the implementation and user study, this book presents an excellent overview of Japan's contemporary technical challenges in the field of human–computer interaction. The next information era will be one in which information is used to cultivate human and social potential. Driven by this vision, the outcomes provided in this work were accomplished as challenges to establish basic technologies for achieving harmony between human beings and the information environment by integrating element technologies including real-space communication, human interfaces, and media processing. Ranging from the neuro-cognitive level to the field trial, the research activities integrated novel perceptual technologies that even exceed human ability to sense, capture, and affect the real world. This book grew out of one of the CREST research areas funded by the Japan Science and Technology Agency. The theme of the project is “the creation of human-harmonized information technology for convivial society”, where 17 research teams aimed at a common goal. The project promotes a trans-disciplinary approach featuring (1) recognition and comprehension of human behaviors and real-space contexts by utilizing sensor networks and ubiquitous computing, (2) technologies for facilitating man–machine communication by utilizing robots and ubiquitous networks, and (3) content technologies for analyzing, mining, integrating, and structuring multimedia data including those in text, voice, music, and images. This is the second of two volumes, which is contributed by eight team leaders. Besides describing the technical challenges, each contribution lays much weight on discussing the philosophy, concepts, and the implications underlying the project. This work will provide researchers and practitioners in the related areas with an excellent opportunity to find interesting new developments and to think about the relationship between human and information technology.
Author: Margaret E. van Biene-HersheyPublish On: 2013-04-17
(ISEM). Kamalasen Rajalingham, David Chadwick, Brian Knight, Dilwyn Edwards Information Integrity Research Centre School of Computing & Mathematical ...
Author: Margaret E. van Biene-Hershey
This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems". IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. We want to recommend this book to security specialists, IT auditors and researchers who want to learn more about the business concerns related to integrity. Those same security specialists, IT auditors and researchers will also value this book for the papers presenting research into new techniques and methods for obtaining the desired level of integrity. The third conference represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The conference objectives are: • To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; • To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; • To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general.
Result comparison Matcher NDCG Scenario 1 NDCG Senario 2 Path-based matcher 0.977 0.970 iSem hybrid 0.990 0.886 SAWSDL-MX 0.937 0.867 SAWSDL is a hybrid ...
Author: Selmin Nurcan
This book constitutes the proceedings of the CAiSE Forum from the 26th International Conference on Advanced Information Systems Engineering, CAiSE 2014, held in Thessaloniki, Greece, June 2014. The CAiSE 2014 Forum was a place to present and discuss new ideas, emerging topics, and controversial positions, and to demonstrate innovative tools and systems related to information systems engineering. To this end, three types of submissions were invited: visionary papers presenting innovative research projects at an early stage, demo papers describing novel tools and prototypes; and case studies reporting industrial applications. The 17 papers in this volume were carefully reviewed and selected from 45 submissions and include 12 visionary papers, four demo papers, and one case study. The reworked and extended versions of the original presentations cover topics such as business process management, process mining, enterprise architecture and modeling, model-driven development, and requirements engineering.
... Research ISCS: Information Service Computer System • Intermediate Science ... Space Enterprises - Lavochkin Associates ISEM: Information Systems, ...
Publisher: Springer Science & Business Media
This compilation probably looks like one of the craziest things a human being could spend his or her time on. Yet nobody would wonder at someone taking a short walk every day - after twenty five years that person would have covered a surprisingly long distance. This is exactly the story behind this list, which appeared first as a few pages within the directory StarGuides (or whatever name it had at that time) and as a distinct sister publication since 1990. The idea behind this dictionary is to offer astronomers and related space scientists practical assistance in decoding the numerous abbreviations, acronyms, contractions and symbols which they might encounter in all aspects of the vast range of their professional activities, including traveling. Perhaps it is a bit paradoxical, but if scientists quickly grasp the meaning of an acronym solely in their own specific discipline, they will probably encounter more difficulties when dealing with adjacent fields. It is for this purpose that this dictionary might be most often used. Scientists might also refer to this compilation in order to avoid identifying a project by an acronym which already has too many meanings or confused definitions.
To handle special principles of information system security engineering, ... ISEM. Methodology. A security research institution in Korea had adopted a ...
Author: Kefei Chen
This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou, China, in April 2006. The 35 revised full papers presented were carefully reviewed and selected from 307 submissions. The papers are organized in topical sections.
... Working Group I&SE Installation & Service Engineering ISE Image Symbol Editor ... Space Enterprises - Lavochkin Associates ISEM Information Systems, ...
Author: Andre Heck
Publisher: Springer Science & Business Media
With about 200,000 entries, StarBriefs Plus represents the most comprehensive and accurately validated collection of abbreviations, acronyms, contractions and symbols within astronomy, related space sciences and other related fields. As such, this invaluable reference source (and its companion volume, StarGuides Plus) should be on the reference shelf of every library, organization or individual with any interest in these areas. Besides astronomy and associated space sciences, related fields such as aeronautics, aeronomy, astronautics, atmospheric sciences, chemistry, communications, computer sciences, data processing, education, electronics, engineering, energetics, environment, geodesy, geophysics, information handling, management, mathematics, meteorology, optics, physics, remote sensing, and so on, are also covered when justified. Terms in common use and/or of general interest have also been included where appropriate.
M: , the fuzzy addition operation of M ( j = 1,2,....., m) values is performed ... expressed as follows: V(M = M.) = hgt (M1 nM) = p,(d) a' 1, m, 2 m, ise, ...
Author: Papajorgji, Petraq
Publisher: IGI Global
Many factors can impact large-scale enterprise management systems, and maintaining these systems can be a complicated and challenging process. Therefore, businesses can benefit from an assortment of models and management styles to track and collect data for processes. Enterprise Business Modeling, Optimization Techniques, and Flexible Information Systems supplies a wide array of research on the intersections of business modeling, information systems, and optimization techniques. These various business models and structuring methods are proposed to provide ideas, methods, and points of view for managers, practitioners, entrepreneurs, and researchers on how to improve business processes.
ISEM has also been applied to develop integrated information security systems. As fig.1 shows, ISEM consists of 3 developmental processes, which are the 1st ...
Author: Kim Sehun
Publisher: Springer Science & Business Media
Category: Business & Economics
This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007.The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical sections on Public Key Crypto Applications, Biometrics/Information Hiding, Secure Hardware, Secure Systems, Wireless and Mobile Security, Application Security/Secure Systems, Access Control/DB Security, Smart Cards/Secure Systems and Anonymity and P2P Security.
Designing Entity - Relationship Schemes for Conventional Information Systems .
In Proc . Of the 3td Int . Conf . On the ER Approach to ... [ CHIA94 ] R.H.L Chiang ,
T - M Barron and V.C Storey . Reverse Engineering of Relational Databases ...
The OO ISE schema combined with the mediator database system provides a natural and ... is to act J.-M. Bruel and Z. Bellahsène (Eds.): OOIS 2002 Workshops, ...
Author: Jean-Michel Bruel
For the ?rst time four workshops have been held in conjunction with the 8th Object-Oriented Information Systems conference, OOIS 2002, to encourage - teraction between researchers and practitioners. Workshop topics are, of course, inline with the conference’s scienti?c scope and provide a forum for groups of researchers and practitioners to meet together more closely and to exchange opinions and advanced ideas, and to share preliminary results on focused issues in an atmosphere that fosters interaction and problem solving. The conference hosted four one-day workshops. The four selected workshops were fully in the spirit of a workshop session hosted by a main conference. Indeed, OOIS deals with all the topics related to the use of object-oriented techniques for the development of information systems. The four workshops are very speci?c and contribute to enlarging the spectrum of the more general topics treated in the main conference. The ?rst workshop focused on a very speci?c and key c- cept of object-oriented development, the specialization/generalization hierarchy. The second one explored the use of “non-traditional” approaches (at the edge of object-oriented techniques, such as aspects, AI, etc.) to improve reuse. The third workshop dealt with optimization in Web-based information systems. And ?nally the fourth workshop investigated issues related to model-driven software development.
Harmsen  allocates methodological knowledge onto three levels: method engineering level (ME), IS engineering methods level (ISEM), and IS engineering ...
Author: Yannis Manolopoulos
This book constitutes the refereed proceedings of the 10th East European Conference on Advances in Databases and Information Systems, ADBIS 2006. The book presents 29 high-quality papers selected in a rigorous reviewing process. The papers address a wide range of hot research issues and are organized in topical sections on: XML databases and semantic web, web information systems and middleware, query processing and indexing, modelling and design issues, and more.
... Isem-Versailles A. Bossavit, Toshiyuki Takagi, Gérard A. Maugin, ... Second IEEE International Conference on Signals Systems Decision and Information ...
Author: A. Bossavit
Publisher: IOS Press
This publication contains a selection of 124 papers among the 165 full-length contributions which were submitted on-site at ISEM 2003. The objective of the symposia series is to vigorously promote the research in the field of electro-mechanical systems. The reader will, we hope, appreciate the variety of topics that were addressed. This is what makes ISEM so stimulating for whoever is interested in the applications of electromagnetics and its opening toward many technical fields. Yet, this publication does not intend to be a mosaic of sub-disciplines, but aims at their integration and synergy. This will be demonstrated by the present selection.
... Laboratory ISEM — International Society of Ecological Modelling ( ISEM )
InstanTechEx - InstanTechEx Katalog over Forskningsaktiviteter — Norsk
Oseanografisk Datasenter ( NOD ) Marine Environmental Data Information
Referral System ...
Publisher: R. R. Bowker
Category: Information storage and retrieval systems
Integrating fuzzy technology in EDM process control. 11th International Symposium for Electromachining (ISEM-XI), Lausanne, Switzerland (pp. 287-293).
Author: Xuan F. Zha
Publisher: IGI Global
Researchers in the evolving fields of artificial intelligence and information systems are constantly presented with new challenges. Artificial Intelligence and Integrated Intelligent Information Systems: Emerging Technologies and Applications provides both researchers and professionals with the latest knowledge applied to customized logic systems, agent-based approaches to modeling, and human-based models. Artificial Intelligence and Integrated Intelligent Information Systems: Emerging Technologies and Applications presents the recent advances in multi-mobile agent systems, the product development process, fuzzy logic systems, neural networks, and ambient intelligent environments among many other innovations in this exciting field.
(http://www.ise.ufl.edu/it/) Harel, D. and M. Politi (1998) Modeling Reactive Systems with Statecharts: The STATEMATE Approach. New York: McGraw-Hill.
Author: Thomas Boucher
Category: Business & Economics
Design of Industrial Information Systems presents a body of knowledge applicable to many aspects of industrial and manufacturing systems. New software systems, such as Enterprise Resource Planning, and new hardware technologies, such as RFID, have made it possible to integrate what were separate IT databases and operations into one system to realize the greatest possible operational efficiencies. This text provides a background in, and an introduction to, the relevant information technologies and shows how they are used to model and implement integrated IT systems. With the growth of courses in information technology offered in industrial engineering and engineering management programs, the authors have written this book to show how such computer-based knowledge systems are designed and used in modern manufacturing and industrial companies. Introduces Data Modeling and Functional Architecture Design, with a focus on integration for overall system design Encompasses hands-on approach, employing many in-chapter exercises and end-of-chapter problem sets with case studies in manufacturing and service industries Shows the reader how Information Systems can be integrated into a wider E-business/Web-Enabled Database business model Offers applications in Enterprise Resource Planning (ERP) and Manufacturing Execution Systems (MES)