Search results for "Information Systems."
showing 10 items of 1545 documents
Efficient lower and upper bounds of the diagonal-flip distance between triangulations
2006
There remains today an open problem whether the rotation distance between binary trees or equivalently the diagonal-flip distance between triangulations can be computed in polynomial time. We present an efficient algorithm for computing lower and upper bounds of this distance between a pair of triangulations.
An efficient upper bound of the rotation distance of binary trees
2000
A polynomial time algorithm is developed for computing an upper bound for the rotation distance of binary trees and equivalently for the diagonal-flip distance of convex polygons triangulations. Ordinal tools are used.
The Myriad Virtues of Wavelet Trees
2009
Wavelet Trees have been introduced in [Grossi, Gupta and Vitter, SODA '03] and have been rapidly recognized as a very flexible tool for the design of compressed full-text indexes and data compressors. Although several papers have investigated the beauty and usefulness of this data structure in the full-text indexing scenario, its impact on data compression has not been fully explored. In this paper we provide a complete theoretical analysis of a wide class of compression algorithms based on Wavelet Trees. We also show how to improve their asymptotic performance by introducing a novel framework, called Generalized Wavelet Trees, that aims for the best combination of binary compressors (like,…
An ecological model of bridging the digital divide in education: A case study of OLPC deployment in Nepal
2018
Investigating Centrality Measures in Social Networks with Community Structure
2021
Centrality measures are crucial in quantifying the influence of the members of a social network. Although there has been a great deal of work dealing with this issue, the vast majority of classical centrality measures are agnostic of the community structure characterizing many social networks. Recent works have developed community-aware centrality measures that exploit features of the community structure information encountered in most real-world complex networks. In this paper, we investigate the interactions between 5 popular classical centrality measures and 5 community-aware centrality measures using 8 real-world online networks. Correlation as well as similarity measures between both t…
Burrows–Wheeler transform and Sturmian words
2003
ERP and Organizational Misfits: An ERP Customization Journey
2016
Abstract Enterprise resource planning (ERP) projects are complex and resource demanding. Some ERP projects fail due to what is called ‘misfit’ between the adopting organization's business requirements and the ERP's functionalities. Existing literature has studied how ERP systems match to different organizations and have argued that there always exists a gap between the business rules embedded in the system, and the practices and processes that exist in organizations. Thus, tailoring might be an important procedure during ERP implementations, in which the ERP customization takes place in order to ensure the compliance with the organizations’ critical business processes and requirements. Via …
Managing Multi-center Flow Cytometry Data for Immune Monitoring.
2014
With the recent results of promising cancer vaccines and immunotherapy 1 – 5 , immune monitoring has become increasingly relevant for measuring treatment-induced effects on T cells, and an essential tool for shedding light on the mechanisms responsible for a successful treatment. Flow cytometry is the canonical multi-parameter assay for the fine characterization of single cells in solution, and is ubiquitously used in pre-clinical tumor immunology and in cancer immunotherapy trials. Current state-of-the-art polychromatic flow cytometry involves multi-step, multi-reagent assays followed by sample acquisition on sophisticated instruments capable of capturing up to 20 parameters per cell at a…
Credit card incidents and control systems
2012
Abstract Credit and debit cards have spread and skyrocketed all around the world to become the most popular means of payments in many countries. Despite their enormous popularity, cards are not free of risk. Technology development and e-commerce have exponentially increased internal credit card incidents. This paper identifies and quantifies the different types of credit card fraud and puts into question the effectiveness of the role assigned to cardholders in its detection.
Consumer attitude toward using smart shopping carts: a comparative analysis of Italian and Croatian consumer attitudes
2016
This paper aims to explore consumer attitudes toward using smart shopping cart, considering country of origin, gender, age, and intentions to use smart shopping carts while purchasing. Moreover, it investigates the influence of extracted factors on consumers' attitudes toward using smart shopping carts and the users' levels of digital competence. The data was collected through survey questionnaires using a purposive sample of 313 Croatian and Italian respondents. To this end, we applied statistical methodologies such as binary logistic regression, factor analysis, and analysis of variance. We found that, compared with Croatians, Italian respondents have a more positive attitude toward using…