Search results for "Information Systems."

showing 10 items of 1545 documents

Efficient lower and upper bounds of the diagonal-flip distance between triangulations

2006

There remains today an open problem whether the rotation distance between binary trees or equivalently the diagonal-flip distance between triangulations can be computed in polynomial time. We present an efficient algorithm for computing lower and upper bounds of this distance between a pair of triangulations.

Binary treeOpen problem010102 general mathematicsDiagonalApproximation algorithmTriangulation (social science)0102 computer and information sciences01 natural sciencesUpper and lower boundsComputer Science ApplicationsTheoretical Computer ScienceCombinatorics010201 computation theory & mathematicsTheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITYSignal Processing[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]0101 mathematicsRotation (mathematics)Time complexityComputingMilieux_MISCELLANEOUSInformation SystemsMathematics
researchProduct

An efficient upper bound of the rotation distance of binary trees

2000

A polynomial time algorithm is developed for computing an upper bound for the rotation distance of binary trees and equivalently for the diagonal-flip distance of convex polygons triangulations. Ordinal tools are used.

Binary treeRegular polygonComputer Science::Computational GeometryUpper and lower boundsComputer Science ApplicationsTheoretical Computer ScienceCombinatoricsTheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITYLattice (order)Signal ProcessingTime complexityComputingMethodologies_COMPUTERGRAPHICSInformation SystemsMathematicsInformation Processing Letters
researchProduct

The Myriad Virtues of Wavelet Trees

2009

Wavelet Trees have been introduced in [Grossi, Gupta and Vitter, SODA '03] and have been rapidly recognized as a very flexible tool for the design of compressed full-text indexes and data compressors. Although several papers have investigated the beauty and usefulness of this data structure in the full-text indexing scenario, its impact on data compression has not been fully explored. In this paper we provide a complete theoretical analysis of a wide class of compression algorithms based on Wavelet Trees. We also show how to improve their asymptotic performance by introducing a novel framework, called Generalized Wavelet Trees, that aims for the best combination of binary compressors (like,…

Binary treeWeight-balanced treeWavelet transformCascade algorithmData_CODINGANDINFORMATIONTHEORYHuffman codingData CompressionTheoretical Computer ScienceComputer Science ApplicationsSet partitioning in hierarchical treessymbols.namesakeWaveletComputational Theory and Mathematicssymbolsempirical entropyBurrows-Wheeler TransformAlgorithmData compressionMathematicsInformation SystemsWavelet Trees
researchProduct

An ecological model of bridging the digital divide in education: A case study of OLPC deployment in Nepal

2018

Bridging (networking)05 social sciences02 engineering and technologyInformation ecologySoftware deployment020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringRegional scienceSocial ecological modelSociologyDigital divide050203 business & managementInformation SystemsThe Electronic Journal of Information Systems in Developing Countries
researchProduct

Investigating Centrality Measures in Social Networks with Community Structure

2021

Centrality measures are crucial in quantifying the influence of the members of a social network. Although there has been a great deal of work dealing with this issue, the vast majority of classical centrality measures are agnostic of the community structure characterizing many social networks. Recent works have developed community-aware centrality measures that exploit features of the community structure information encountered in most real-world complex networks. In this paper, we investigate the interactions between 5 popular classical centrality measures and 5 community-aware centrality measures using 8 real-world online networks. Correlation as well as similarity measures between both t…

Bridging (networking)Social networkExploitbusiness.industryComputer scienceNode (networking)Community structure02 engineering and technologyComplex networkData science[INFO.INFO-SI]Computer Science [cs]/Social and Information Networks [cs.SI][INFO.INFO-LG]Computer Science [cs]/Machine Learning [cs.LG]020204 information systemsSimilarity (psychology)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessCentralityComputingMilieux_MISCELLANEOUS
researchProduct

Burrows–Wheeler transform and Sturmian words

2003

Burrows–Wheeler transformSignal ProcessingFormal languageSturmian wordArithmeticWord (computer architecture)Computer Science ApplicationsInformation SystemsTheoretical Computer ScienceMathematicsInformation Processing Letters
researchProduct

ERP and Organizational Misfits: An ERP Customization Journey

2016

Abstract Enterprise resource planning (ERP) projects are complex and resource demanding. Some ERP projects fail due to what is called ‘misfit’ between the adopting organization's business requirements and the ERP's functionalities. Existing literature has studied how ERP systems match to different organizations and have argued that there always exists a gap between the business rules embedded in the system, and the practices and processes that exist in organizations. Thus, tailoring might be an important procedure during ERP implementations, in which the ERP customization takes place in order to ensure the compliance with the organizations’ critical business processes and requirements. Via …

Business requirementsKnowledge managementTailoringBusiness ruleBusiness processComputer sciencebusiness.industry05 social sciences02 engineering and technologyFitERP SystemsPersonalizationResource (project management)Order (exchange)020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringGeneral Earth and Planetary SciencesMisfitbusinessImplementationEnterprise resource planning050203 business & managementCustomizationGeneral Environmental ScienceProcedia Computer Science
researchProduct

Managing Multi-center Flow Cytometry Data for Immune Monitoring.

2014

With the recent results of promising cancer vaccines and immunotherapy 1 – 5 , immune monitoring has become increasingly relevant for measuring treatment-induced effects on T cells, and an essential tool for shedding light on the mechanisms responsible for a successful treatment. Flow cytometry is the canonical multi-parameter assay for the fine characterization of single cells in solution, and is ubiquitously used in pre-clinical tumor immunology and in cancer immunotherapy trials. Current state-of-the-art polychromatic flow cytometry involves multi-step, multi-reagent assays followed by sample acquisition on sophisticated instruments capable of capturing up to 20 parameters per cell at a…

Cancer ResearchComputer scienceData managementREST APIdata provenancecomputer.software_genrelcsh:RC254-282automated analysisData modelinglaboratory informatics03 medical and health sciences0302 clinical medicineLaboratory informaticsreproducible analysisFlow cytometry030304 developmental biologyOriginal Research0303 health sciencesApplication programming interfacebusiness.industrymetadatalcsh:Neoplasms. Tumors. Oncology. Including cancer and carcinogensData scienceAutomationMetadataManagement information systemsOncologyData miningdata managementbusinesscomputer030215 immunologyCommunication channelCancer informatics
researchProduct

Credit card incidents and control systems

2012

Abstract Credit and debit cards have spread and skyrocketed all around the world to become the most popular means of payments in many countries. Despite their enormous popularity, cards are not free of risk. Technology development and e-commerce have exponentially increased internal credit card incidents. This paper identifies and quantifies the different types of credit card fraud and puts into question the effectiveness of the role assigned to cardholders in its detection.

Card security codeComputer Networks and Communicationsmedia_common.quotation_subjectCredit card fraudLibrary and Information SciencesPaymentComputer securitycomputer.software_genreATM cardCredit cardBusinesscomputerMerchant servicesChargebackCredit card interestInformation Systemsmedia_commonInternational Journal of Information Management
researchProduct

Consumer attitude toward using smart shopping carts: a comparative analysis of Italian and Croatian consumer attitudes

2016

This paper aims to explore consumer attitudes toward using smart shopping cart, considering country of origin, gender, age, and intentions to use smart shopping carts while purchasing. Moreover, it investigates the influence of extracted factors on consumers' attitudes toward using smart shopping carts and the users' levels of digital competence. The data was collected through survey questionnaires using a purposive sample of 313 Croatian and Italian respondents. To this end, we applied statistical methodologies such as binary logistic regression, factor analysis, and analysis of variance. We found that, compared with Croatians, Italian respondents have a more positive attitude toward using…

CartInternet retailing; smart shopping carts; functional factors; convenience factors; Croatia; Italy; consumer attitudes; country of origin; gender; age; purchase intentions; digital competence; smart carts.CroatiaSample (statistics)Logistic regressionManagement Information Systems0502 economics and businessBusiness and International ManagementMarketingconvenient factorDigital competenceMarketing05 social sciencesPurchasing processsmart shopping cartAdvertisinginternet retailing; smart shopping cart; functional factors; convenient factors; CroatiaPurchasingCountry of originfunctional factorInformation and Communications Technology050211 marketinginternet retailingBusinessInternet retailing; smart shopping carts; functional factors; convenience factors; Croatia; Italy; consumer attitudes; country of origin; gender; age; purchase intentions; digital competence; smart cartsSettore SECS-P/08 - Economia E Gestione Delle Imprese050203 business & management
researchProduct