Search results for "Information Systems"

showing 10 items of 1926 documents

ENFORCEMENT OF INTER-TASK DEPENDENCIES IN WORKFLOWS, CHARACTERIZATION AND PARADIGM

1998

Workflow techniques have gained a lot of attention as a means to support advanced business applications such as cooperative information systems and process re-engineering but also as a means to integrate legacy systems. Inter-task dependencies, described separately from the other parts of the workflow, have been recognized as a valuable method in describing certain restrictions on the executions of workflows. In this paper, we study the issue of pre-analysing and enforcing inter-task dependencies. The protocol and the theory behind it are presented, along with examples and discussions on ways to improve the performance. The idea is to present the meaning of a dependency through an automato…

Theoretical computer scienceCorrectnessDependency (UML)Event (computing)Computer scienceProgramming languageLegacy systemcomputer.software_genreComputer Science ApplicationsAutomatonTask (project management)Dependency theory (database theory)WorkflowcomputerInformation SystemsInternational Journal of Cooperative Information Systems
researchProduct

Supervised learning of time-independent Hamiltonians for gate design

2018

We present a general framework to tackle the problem of finding time-independent dynamics generating target unitary evolutions. We show that this problem is equivalently stated as a set of conditions over the spectrum of the time-independent gate generator, thus transforming the task to an inverse eigenvalue problem. We illustrate our methodology by identifying suitable time-independent generators implementing Toffoli and Fredkin gates without the need for ancillae or effective evolutions. We show how the same conditions can be used to solve the problem numerically, via supervised learning techniques. In turn, this allows us to solve problems that are not amenable, in general, to direct ana…

Theoretical computer scienceDiagonalFOS: Physical sciencesGeneral Physics and AstronomyInverseToffoli gate02 engineering and technologysupervised learning01 natural sciencesUnitary statequantum computingSettore FIS/03 - Fisica Della Materia010305 fluids & plasmasSet (abstract data type)Computer Science::Hardware Architecturesymbols.namesakeComputer Science::Emerging Technologiesquant-ph020204 information systems0103 physical sciences0202 electrical engineering electronic engineering information engineering010306 general physicsEigenvalues and eigenvectorsQuantum computerMathematicsPhysicsFlexibility (engineering)Discrete mathematicsQuantum PhysicsSupervised learningInverse problemHermitian matrixmachine learningQubitsymbolsPairwise comparisonquantum circuitsQuantum Physics (quant-ph)Hamiltonian (quantum mechanics)Generator (mathematics)Quantum Information and Measurement (QIM) V: Quantum Technologies
researchProduct

Algorithmic Analysis of Programs with Well Quasi-ordered Domains

2000

AbstractOver the past few years increasing research effort has been directed towards the automatic verification of infinite-state systems. This paper is concerned with identifying general mathematical structures which can serve as sufficient conditions for achieving decidability. We present decidability results for a class of systems (called well-structured systems) which consist of a finite control part operating on an infinite data domain. The results assume that the data domain is equipped with a preorder which is a well quasi-ordering, such that the transition relation is “monotonic” (a simulation) with respect to the preorder. We show that the following properties are decidable for wel…

Theoretical computer scienceFinite-state machineReachability problemData domainPreorderPetri netComputer Science ApplicationsTheoretical Computer ScienceDecidabilityComputational Theory and MathematicsReachabilityMathematical structureComputer Science::Formal Languages and Automata TheoryInformation SystemsMathematicsInformation and Computation
researchProduct

Heuristics for the Constrained Incremental Graph Drawing Problem

2019

Abstract Visualization of information is a relevant topic in Computer Science, where graphs have become a standard representation model, and graph drawing is now a well-established area. Within this context, edge crossing minimization is a widely studied problem given its importance in obtaining readable representations of graphs. In this paper, we focus on the so-called incremental graph drawing problem, in which we try to preserve the user’s mental map when obtaining successive drawings of the same graph. In particular, we minimize the number of edge crossings while satisfying some constraints required to preserve the position of vertices with respect to previous drawings. We propose heur…

Theoretical computer scienceOptimization problemCombinatorial optimizationInformation Systems and ManagementGeneral Computer ScienceComputer science0211 other engineering and technologiesHeuristicMetaheuristic02 engineering and technologyManagement Science and Operations ResearchIndustrial and Manufacturing EngineeringGraph drawing0502 economics and business050210 logistics & transportation021103 operations researchHeuristic05 social sciencesComputer Science (all)SolverGraphVertex (geometry)VisualizationGraph drawingModeling and SimulationCombinatorial optimizationHeuristicsMathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

Multiple SIP strategies and bottom-up adorning in logic query optimization

1990

Preprocessing methods called “readorning” and “bottom-up adorning” are introduced as means of enlarging the application domain of magic sets and related query optimization strategies for logic databases. Readorning tries to make possible the simultaneous use of multiple sideways information passing (sip) strategies defined for a rule, thus yielding an optimization effect that may not be achieved by any particular choice of sip strategies. Bottom-up adorning is used to make magic sets applicable to cases in which potential optimizations can be derived from bindings coming upwards from rule bodies to rule heads in bottom-up evaluation. These include the cases in which we know that some base r…

Theoretical computer scienceRelation (database)Programming languageComputer science0102 computer and information sciences02 engineering and technologyTop-down and bottom-up designBase (topology)computer.software_genreQuery optimization01 natural sciencesDomain (software engineering)Datalog010201 computation theory & mathematicsApplication domain020204 information systems0202 electrical engineering electronic engineering information engineeringPreprocessorcomputercomputer.programming_language
researchProduct

Automata and forbidden words

1998

Abstract Let L ( M ) be the (factorial) language avoiding a given anti-factorial language M . We design an automaton accepting L ( M ) and built from the language M . The construction is effective if M is finite. If M is the set of minimal forbidden words of a single word ν, the automaton turns out to be the factor automaton of ν (the minimal automaton accepting the set of factors of ν). We also give an algorithm that builds the trie of M from the factor automaton of a single word. It yields a nontrivial upper bound on the number of minimal forbidden words of a word.

TheoryofComputation_COMPUTATIONBYABSTRACTDEVICES[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]Büchi automaton0102 computer and information sciences02 engineering and technologyω-automaton01 natural sciencesTheoretical Computer ScienceCombinatoricsDeterministic automaton0202 electrical engineering electronic engineering information engineeringTwo-way deterministic finite automatonNondeterministic finite automatonMathematicsPowerset constructionLevenshtein automaton020206 networking & telecommunicationsComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)Nonlinear Sciences::Cellular Automata and Lattice GasesComputer Science ApplicationsTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES010201 computation theory & mathematicsSignal ProcessingProbabilistic automatonComputer Science::Programming LanguagesComputer Science::Formal Languages and Automata TheoryInformation Systems
researchProduct

Distributed Consensus in Noncooperative Inventory Games

2009

This paper deals with repeated nonsymmetric congestion games in which the players cannot observe their payoffs at each stage. Examples of applications come from sharing facilities by multiple users. We show that these games present a unique Pareto optimal Nash equilibrium that dominates all other Nash equilibria and consequently it is also the social optimum among all equilibria, as it minimizes the sum of all the players’ costs. We assume that the players adopt a best response strategy. At each stage, they construct their belief concerning others probable behavior, and then, simultaneously make a decision by optimizing their payoff based on their beliefs. Within this context, we provide a …

TheoryofComputation_MISCELLANEOUSComputer Science::Computer Science and Game TheoryInformation Systems and ManagementGeneral Computer ScienceManagement Science and Operations ResearchIndustrial and Manufacturing Engineeringsymbols.namesakeSettore ING-INF/04 - AutomaticaGame theory; Multi-agent systems; Inventory; Consensus protocolsEconomicsRisk dominanceGame theoryMulti-agent systemsStochastic gameInventoryComputingMilieux_PERSONALCOMPUTINGTheoryofComputation_GENERALRationalizabilityConsensus protocols; Game theory; Inventory; Multi-agent systemsConsensus protocolsMulti-agent systemNash equilibriumEquilibrium selectionModeling and SimulationBest responsesymbolsRepeated gameEpsilon-equilibriumSettore MAT/09 - Ricerca OperativaMathematical economics
researchProduct

Multiobjective GRASP with Path Relinking

2015

In this paper we review and propose different adaptations of the GRASP metaheuristic to solve multiobjective combinatorial optimization problems. In particular, we describe several alternatives to specialize the construction and improvement components of GRASP when two or more objectives are considered. GRASP has been successfully coupled with Path Relinking for single-objective optimization. Moreover, we propose different hybridizations of GRASP and Path Relinking for multiobjective optimization. We apply the proposed GRASP with Path Relinking variants to two combinatorial optimization problems, the biobjective orienteering problem and the biobjective path dissimilarity problem. We report …

TheoryofComputation_MISCELLANEOUSMathematical optimizationInformation Systems and ManagementGeneral Computer ScienceBiobjective optimizationGRASPCombinatorial optimization problemOrienteeringManagement Science and Operations ResearchMulti-objective optimizationIndustrial and Manufacturing EngineeringModeling and SimulationPath (graph theory)HeuristicsMetaheuristicMathematicsEuropean Journal of Operational Research
researchProduct

Retail pricing decisions and product category competitive structure

2010

This study addresses the use of demand forecasting techniques by retailers to support their decision making. Specifically, the authors propose a pricing decision support model for retailers to estimate optimal prices, whose output depends on the configuration of a supporting measurement model. The measurement model is a demand function that relates sales and prices within the category; optimal prices are those whose effects on demand and retail margins maximize the category's profitability. This investigation focuses particularly on the role of competitive structure, such that the authors consider two types of price competition asymmetries for demand forecasting: those depending on the bran…

TheoryofComputation_MISCELLANEOUSProduct categoryDecision support systemInformation Systems and ManagementDemand forecastingManagement Information SystemsMicroeconomicsCompetition (economics)Arts and Humanities (miscellaneous)Demand curveCategory managementDevelopmental and Educational PsychologyEconomicsProfitability indexMarketingInformation SystemsOptimal decisionDecision Support Systems
researchProduct

Adjusting Software Revenue and Pricing Strategies in the Era of Cloud Computing

2016

Competitive forces shape software revenue and pricing models in cloud computing.Different revenue and pricing models lead to different competitive strategies.Software firms apply mixed revenue models, or a hybrid pricing mechanism.Software renting provides flexibility for software providers against competition.Software architecture may either limit possibilities for different revenue models. Recent research has recognized cloud computing as a new paradigm of servitization in which software products are offered based on service contracts. Thus, instead of selling software licenses, software vendors can rent software as a service to customers. However, it is still unclear how software provide…

TheoryofComputation_MISCELLANEOUSService (systems architecture)competitive strategy02 engineering and technologyCompetitive advantageSoftware020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringRevenuesoftware pricingIndustrial organizationta113business.industrySoftware as a service05 social sciencescloud computingManagementSoftware asset managementSaaSPricing strategiesRevenue modelHardware and ArchitectureBusinessservitization050203 business & managementSoftwareInformation Systems
researchProduct