Search results for "Project management"
showing 10 items of 1539 documents
Understanding the ITIL Implementation Project: Conceptualization and Measurements
2011
The purpose of this research is to contribute to the theorizing of ITIL. The paper provides a model that conceptualizes the scope and content of an ITIL implementation project, and it tests and validates measurements based on a literature study and data from a survey of 446 Nordic ITIL experts.
Analyzing the strategies used in media discourse management
2015
Digital economy is based on digital revolution and information management that gave rise to the new media image in the era of globalization. Media and media discourse management is a completely new concept for establishing innovative relations between manufacturer and consumer. The subject of interest of the present article is the analysis of the existing strategies in media discourse management. The introduction concerns the etymological meanings of the notion of discourse and its application. The main objective of the study is to reveal the capacity of media discourse management in expanding the consumers’ cognitive resources and maintaining stable information links in everyday life. The …
Security and privacy in the cloud a long-term view
2011
In this paper we analyze security and privacy aspects of the cloud. We take a long-term view since the scope of privacy is potentially the lifetime of the privacy subject. We investigate trust issues and privacy aspects for cloud service users, using subjective logic as a primary tool. We also present promising solution for credible privacy in a cloud environment.
Emotional after‐effects on the P3 component of the event‐related brain potential
2003
Agrowing body of literature indicates that affective states can influence cognitive processes. The core assumption of Ellis and Ashbrook's (1988) model explaining these emotional after-effects on cognition is that the emotional state regulates the allocation of processing resources. A negative emotional state is supposed to pre-empt capacity normally allocated to the cognitive task at hand. This is assumed to occur because the negative emotional state leads to an increase in intrusive, irrelevant thoughts, which compete with relevant cognitive activities and thus result in a lack of attention given to relevant features of the task to be performed. In the present study, the hypothesis that n…
Combining content extraction heuristics
2008
The main text content of an HTML document on the WWW is typically surrounded by additional contents, such as navigation menus, advertisements, link lists or design elements. Content Extraction (CE) is the task to identify and extract the main content. Ongoing research has spawned several CE heuristics of different quality. However, so far only the Crunch framework combines several heuristics to improve its overall CE performance. Since Crunch, though, many new algorithms have been formulated. The CombinE system is designed to test, evaluate and optimise combinations of CE heuristics. Its aim is to develop CE systems which yield better and more reliable extracts of the main content of a web …
SHREC 2020: Retrieval of digital surfaces with similar geometric reliefs
2020
Abstract This paper presents the methods that have participated in the SHREC’20 contest on retrieval of surface patches with similar geometric reliefs and the analysis of their performance over the benchmark created for this challenge. The goal of the context is to verify the possibility of retrieving 3D models only based on the reliefs that are present on their surface and to compare methods that are suitable for this task. This problem is related to many real world applications, such as the classification of cultural heritage goods or the analysis of different materials. To address this challenge, it is necessary to characterize the local ”geometric pattern” information, possibly forgetti…
A Semantic Model to Query Spatial–Temporal Data
2013
There is a growing need for the study of spatial–temporal objects and their relationships. A common approach for this task is the use of relational databases, which unfortunately do not allow inference. In this research, we introduce a new approach that uses the concept of a “continuum” together with ontologies and semantic Web technologies. The continuum allows us to define parent–child relationships between representations of objects. It also allows us to compare the evolution of two different objects and establish the relationships between them along time. Our approach is based on the four-dimensional fluent, which is extended to obtain spatial–temporal qualitative information from the a…
Cloud Sourcing and Paradigm Shift in IT Governance: Evidence from the Financial Sector
2020
In the digital age, organizations are increasingly shifting their applications, services and infrastructures to the cloud to enhance business agility and reduce IT-related costs. However, in moving applications and data to cloud resources organizations face new risks of privacy violations. To manage this risk, organizations need to be fully aware of threats and vulnerabilities affecting their digital re-sources in cloud. Although some previous studies have focused on the emerging challenges of cloud adoption to governance and control, we know little regarding the paradigm shifts in IT governance processes and practices. To address this gap, we conducted an exploratory case study in two larg…
A Saturation Avoidance Technique for Peer-to-Peer Distributed Virtual Environments
2007
This paper presents a multi-agent framework oriented to animate groups of synthetic humans that properly balance task-oriented and social behaviors. We mainly focus on the social model designed for BDI-agents to display socially acceptable decisions. This model is based on an auction mechanism used to coordinate the group activities derived from the character's roles. The model also introduces reciprocity relations between the members of a group and allows the agents to include social tasks to produce realistic behavioral animations. Furthermore, a conversational library provides the set of plans to manage social interactions and to animate from simple chats to more complex negotiations. Th…
Heuristics for a Real-World Mail Delivery Problem
2011
We are solving a mail delivery problem by combining exact and heuristic methods. The problem is a tactical routing problem as routes for all postpersons have to be planned in advance for a period of several months. As for many other routing problems, the task is to construct a set of feasible routes serving each customer exactly once at minimum cost. Four different modes (car, moped, bicycle, and walking) are available, but not all customers are accessible by all modes. Thus, the problem is characterized by three interdependent decisions: the clustering of customers into districts, the choice of a mode for each district, and the routing of the postperson through its district. We present a t…