Search results for "Project management"

showing 10 items of 1539 documents

Understanding the ITIL Implementation Project: Conceptualization and Measurements

2011

The purpose of this research is to contribute to the theorizing of ITIL. The paper provides a model that conceptualizes the scope and content of an ITIL implementation project, and it tests and validates measurements based on a literature study and data from a survey of 446 Nordic ITIL experts.

Information managementInformation Technology Infrastructure LibraryKnowledge managementProcess managementConceptualizationScope (project management)business.industryComputer scienceInformation systemContext (language use)Literature studyProject managementbusiness2011 22nd International Workshop on Database and Expert Systems Applications
researchProduct

Analyzing the strategies used in media discourse management

2015

Digital economy is based on digital revolution and information management that gave rise to the new media image in the era of globalization. Media and media discourse management is a completely new concept for establishing innovative relations between manufacturer and consumer. The subject of interest of the present article is the analysis of the existing strategies in media discourse management. The introduction concerns the etymological meanings of the notion of discourse and its application. The main objective of the study is to reveal the capacity of media discourse management in expanding the consumers’ cognitive resources and maintaining stable information links in everyday life. The …

Information managementMedia managementMultimediaScope (project management)business.industryApplied MathematicsMechanical EngineeringEnergy Engineering and Power TechnologyMedia relationsPublic relationscomputer.software_genreIndustrial and Manufacturing EngineeringNew mediaComputer Science ApplicationsControl and Systems EngineeringManagement of Technology and InnovationDigital economySociologyElectrical and Electronic EngineeringEveryday lifebusinessDigital RevolutioncomputerEastern-European Journal of Enterprise Technologies
researchProduct

Security and privacy in the cloud a long-term view

2011

In this paper we analyze security and privacy aspects of the cloud. We take a long-term view since the scope of privacy is potentially the lifetime of the privacy subject. We investigate trust issues and privacy aspects for cloud service users, using subjective logic as a primary tool. We also present promising solution for credible privacy in a cloud environment.

Information privacyCloud computing securityScope (project management)Privacy by DesignComputer sciencebusiness.industryPrivacy softwareData_MISCELLANEOUSInternet privacyCloud computingComputer securitycomputer.software_genreTerm (time)ComputingMilieux_COMPUTERSANDSOCIETYSubjective logicbusinesscomputer2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)
researchProduct

Emotional after‐effects on the P3 component of the event‐related brain potential

2003

Agrowing body of literature indicates that affective states can influence cognitive processes. The core assumption of Ellis and Ashbrook's (1988) model explaining these emotional after-effects on cognition is that the emotional state regulates the allocation of processing resources. A negative emotional state is supposed to pre-empt capacity normally allocated to the cognitive task at hand. This is assumed to occur because the negative emotional state leads to an increase in intrusive, irrelevant thoughts, which compete with relevant cognitive activities and thus result in a lack of attention given to relevant features of the task to be performed. In the present study, the hypothesis that n…

Information processingCognitionGeneral MedicineTask (project management)Developmental psychologyMoodArts and Humanities (miscellaneous)Cognitive resource theoryResource allocationEmotional expressionPsychologyGeneral PsychologyEvent (probability theory)Cognitive psychologyInternational Journal of Psychology
researchProduct

Combining content extraction heuristics

2008

The main text content of an HTML document on the WWW is typically surrounded by additional contents, such as navigation menus, advertisements, link lists or design elements. Content Extraction (CE) is the task to identify and extract the main content. Ongoing research has spawned several CE heuristics of different quality. However, so far only the Crunch framework combines several heuristics to improve its overall CE performance. Since Crunch, though, many new algorithms have been formulated. The CombinE system is designed to test, evaluate and optimise combinations of CE heuristics. Its aim is to develop CE systems which yield better and more reliable extracts of the main content of a web …

Information retrievalComputer sciencemedia_common.quotation_subjectDesign elements and principlescomputer.software_genreCrunchTask (project management)Content extractionQuality (business)Data miningHeuristicsWeb documentcomputermedia_commonProceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
researchProduct

SHREC 2020: Retrieval of digital surfaces with similar geometric reliefs

2020

Abstract This paper presents the methods that have participated in the SHREC’20 contest on retrieval of surface patches with similar geometric reliefs and the analysis of their performance over the benchmark created for this challenge. The goal of the context is to verify the possibility of retrieving 3D models only based on the reliefs that are present on their surface and to compare methods that are suitable for this task. This problem is related to many real world applications, such as the classification of cultural heritage goods or the analysis of different materials. To address this challenge, it is necessary to characterize the local ”geometric pattern” information, possibly forgetti…

Information retrievalForgettingGeometric patternComputer scienceGeneral Engineering020207 software engineering3d modelContext (language use)02 engineering and technologyCONTESTComputer Graphics and Computer-Aided DesignTask (project management)Human-Computer InteractionCultural heritageBenchmark (surveying)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputers & Graphics
researchProduct

A Semantic Model to Query Spatial–Temporal Data

2013

There is a growing need for the study of spatial–temporal objects and their relationships. A common approach for this task is the use of relational databases, which unfortunately do not allow inference. In this research, we introduce a new approach that uses the concept of a “continuum” together with ontologies and semantic Web technologies. The continuum allows us to define parent–child relationships between representations of objects. It also allows us to compare the evolution of two different objects and establish the relationships between them along time. Our approach is based on the four-dimensional fluent, which is extended to obtain spatial–temporal qualitative information from the a…

Information retrievalRelational databaseComputer sciencebusiness.industryInferenceSemantic data modelSemanticscomputer.software_genreTemporal databaseTask (project management)Knowledge baseData miningbusinessSemantic Webcomputer
researchProduct

Cloud Sourcing and Paradigm Shift in IT Governance: Evidence from the Financial Sector

2020

In the digital age, organizations are increasingly shifting their applications, services and infrastructures to the cloud to enhance business agility and reduce IT-related costs. However, in moving applications and data to cloud resources organizations face new risks of privacy violations. To manage this risk, organizations need to be fully aware of threats and vulnerabilities affecting their digital re-sources in cloud. Although some previous studies have focused on the emerging challenges of cloud adoption to governance and control, we know little regarding the paradigm shifts in IT governance processes and practices. To address this gap, we conducted an exploratory case study in two larg…

Information securityScope (project management)business.industryCorporate governanceControl (management)Cloud sourcingCloud computingInformation securityBusiness agilityOutsourcingCloud sourcing; Information security; IT governanceParadigm shiftIT governanceBusinessIndustrial organization
researchProduct

A Saturation Avoidance Technique for Peer-to-Peer Distributed Virtual Environments

2007

This paper presents a multi-agent framework oriented to animate groups of synthetic humans that properly balance task-oriented and social behaviors. We mainly focus on the social model designed for BDI-agents to display socially acceptable decisions. This model is based on an auction mechanism used to coordinate the group activities derived from the character's roles. The model also introduces reciprocity relations between the members of a group and allows the agents to include social tasks to produce realistic behavioral animations. Furthermore, a conversational library provides the set of plans to manage social interactions and to animate from simple chats to more complex negotiations. Th…

Intelligent agentMultimediaHuman–computer interactionVirtual machineComputer scienceReciprocity (social psychology)Multi-agent systemcomputer.software_genreSet (psychology)computerComputer animationSocial behaviorTask (project management)2007 International Conference on Cyberworlds (CW'07)
researchProduct

Heuristics for a Real-World Mail Delivery Problem

2011

We are solving a mail delivery problem by combining exact and heuristic methods. The problem is a tactical routing problem as routes for all postpersons have to be planned in advance for a period of several months. As for many other routing problems, the task is to construct a set of feasible routes serving each customer exactly once at minimum cost. Four different modes (car, moped, bicycle, and walking) are available, but not all customers are accessible by all modes. Thus, the problem is characterized by three interdependent decisions: the clustering of customers into districts, the choice of a mode for each district, and the routing of the postperson through its district. We present a t…

InterdependenceMathematical optimizationOperations researchHeuristic (computer science)Computer sciencemedia_common.quotation_subjectConstruct (python library)Routing (electronic design automation)HeuristicsSet (psychology)Cluster analysismedia_commonTask (project management)
researchProduct