![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer software packages > General
This book looks at the social aspects of how virtual and geographically dispersed groups work together using information and communication tools (groupware). It introduces the basic concepts and brings together ideas from various disciplines to provide an integrated approach to the evaluation and design of groupware technology. Key topics include: =B7 Why some collaboration technologies succeed and others fail =B7 The conditions needed for successful distributed collaboration =B7 How to take a systematic, user-oriented, design-related approach to the evaluation of computer supported collaboration Primarily intended for undergraduate and postgraduate students studying Information and Communication Technology, Human-Computer Interaction, Communication Sciences, Human Factors, Interface Design and Multimedia Systems, this book will also be of interest to researchers, practitioners and lecturers in social and organisational sciences.
Hybrid intelligent systems are becoming a very important problem-solving methodology affecting researchers and practitioners in areas ranging from science and technology to business and commerce. This volume focuses on the hybridization of different soft computing technologies and their interactions with hard computing techniques, other intelligent computing frameworks, and agents. Topics covered include: genetic-neurocomputing, neuro-fuzzy systems, genetic-fuzzy systems, genetic-fuzzy neurocomputing, hybrid optimization techniques, interaction with intelligent agents, fusion of soft computing and hard computing techniques, other intelligent systems and hybrid systems applications. The different contributions were presented at the first international workshop on hybrid intelligent systems (HIS1) in Adelaide, Australia.
Deployment is the act of taking components and readying them for productive use. There may be steps following deployment, such as installation or m- agement related functions, but all decisions about how to con?gure and c- pose/assemble a component are made at the deployment stage. This is therefore the one opportunity in the software lifecycle to bridge the gap between what the component developer couldn't know about the deployment environment and what the environment's developer couldn't know about the open set of depl- able components. It is not surprising that deployment as a dedicated step gains importance when addressing issues of system-wide qualities, such as coping with constrained resources or preparing for component adaptation and system evolution. Yet, component deployment is still a discipline in its infancy: it became mainstream practice only in the mid 1990s. Much of the best practice impulse originated in products like Microsoft's Transaction Server and its approach to attribute-based programming and later products like Enterprise JavaBeans and now the Corba Component Model. All these address the speci?c needs of enterprise appli- tion servers. However, the potential of the deployment concept goes far beyond this. Deployment can and should touch e?ectively all truly component-based solutions. The proceedings of Component Deployment 2002 represent a good cro- section of the gamut of deployment issues. From customization to address - source constraints to recon?guration of deployed systems and from architecture to design to languages, the avid reader will ?nd some contribution.
This book constitutes the refereed proceedings of the Second International Conference on Embedded Software, EMSOFT 2002, held in Grenoble, France in October 2002.The book presents 13 invited papers by leading researchers and 17 revised full papers selected during a competitive round of reviewing. The book spans the whole range of embedded software, including operating systems and middleware, programming languages and compilers, modeling and validation, software engineering and programming methodologies, scheduling and execution-time analysis, formal methods, and communication protocols and fault-tolerance
This book constitutes the refereed proceedings of the 21st Conference on Foundations of Software Technology and Theoretical Computer Science, FST TCS 2001, held in Bangalore, India in December 2001.The 23 revised full papers presented together with five invited papers were carefully reviewed and selected from 73 submissions. Among the issues addressed are randomization and derandomization, approximation, Kolmogorov complexity, pseudo-randomness, tree search, model checking, data structures, deterministic algorithms, formal verification, parallel algorithms, minimum-degree spanning trees, scheduling, Petri nets, equivalence logic, and rewriting.
This book constitutes the refereed proceedings of the 8th International Workshop on Groupware, CRIWG 2002, held in La Serena, Chile in September 2002.The 18 revised full papers presented together with a keynote paper were carefully reviewed and selected form 36 submissions. The papers are organized in topical sections on computer supported collaborative learning - CSCL, meeting support, design and development support, awareness, evaluation and tayloring, and infrastructure.
The Third International Conference on Product Focused Software Process Improvement (PROFES 2001) continued the success of the PROFES 99 and PROFES 2000 conferences. PROFES 2001 was organized in Kaiserslautern, Germany, September 10 13, 2001. The PROFES conference has its roots in the PROFES Esprit project (http: //www.ele.vtt.fi/profes/), but it quickly evolved into a full fledged general purpose conference in 1999 and since then it has gained wide spread international popularity. As in previous years, the main theme of PROFES 2001 was professional software process improvement (SPI) motivated by product and service quality needs. SPI is facilitated by software process assessment, software measurement, process modeling, and technology transfer and has become a practical tool for quality software engineering and management. The conference addresses both the solutions found in practice as well as relevant research results from academia. The purpose of the conference is to bring to light the most recent findings and results in the area and to stimulate discussion between the researchers, experienced professionals, and technology providers for SPI."
Prof. Dr. Jorg Biethahn, Inhaber des Lehrstuhls fUr Wirtschaftsinformatik I an der Universitat Gottingen, vollendet am 24. Mai 2002 sein 60. Lebensjahr. Zu diesem Anlass haben Kollegen, Schtiler und Weggefahrten, die dem Jubilar fUr den weiteren Lebensweg alles Gute wUnschen, diese Festschrift verfasst und ihm gewidmet. Jorg Biethahn, Jahrgang 1942, studierte Mathematik, Ingenieurwissenschaften und Wirtschaftswissenschaften mit dem Abschluss Dip10m-Ingenieur. Er promovierte im Fach Wirtschaftswissenschaften zum Dr. rer. pol. und habilitierte sich in den Fachem BWL und Betriebsinformatik tiber das Thema "Optimierung und Simu- lation". Nach Professuren an den Universitaten Bochum und Duisburg ist er seit 1984 Professor fUr Wirtschaftsinformatik an der Georg-August-Universitat Gottingen, wo er auch das Rechenzentrum des Fachbereichs Wirtschafts- und Sozia1wissenschaften 1eitet. Die Forschungsgebiete von Jorg Biethahn zeichnen sich durch eine theoretische Fundierung und einen starken Praxisbezug aus. So beschaftigt er sich vor aHem mit Methoden der praktischen Entscheidungsfindung, die ihn wahrend seiner gesamten wissenschaftlichen Lautbahn faszinierten. Zunachst waren es die line- aren Optimierungsverfahren, die er bei unterschiedlichen Anwendungen in der Praxis erfolgreich einsetzte, urn realisierbare Losungen zu generieren. Nach den allgemeinen Optimierungsverfahren ging er zu den Verfahren der Simulation tiber, die heute noch ein Steckenpferd des Jubilars darstellen. Sehr bekannt und aner- kannt sind die Symposien zur Simulation als betriebliche Entscheidungshilfe, die bereits achtmal unter seiner Leitung in Braunlage (Harz) stattfanden. Auch Pro- blemlosungen mit unscharfen Daten (fuzzy theory) und evolutionare Algorithmen liegen im Forschungsbereich von Jorg Biethahn. Weiterhin beschaftigt er sich eingehend mit dem Autbau und dem Einsatz wissensbasierter Systeme bzw.
Projektmanagement ist in Zeiten von enger werdenden Projektbudgets und ProjektzeitplAnen eine zunehmende Herausforderung geworden. Die Autoren geben wertvolle Hilfestellungen in Krisensituationen und zeigen auf, wie von Anfang an eine durchgAngige Linie in ein Projekt gebracht wird. Ferner werden die diversen Schnittstellen zu den unterschiedlichen Disziplinen im Software Engineering aufgezeigt. Ein weiterer Schwerpunkt des Buches ist der konkrete Einsatz eines Werkzeuges, das den gesamten Prozess aus Sicht des Projektleiters steuert. Weitere Themen sind Berichtswesen, Krisenmanagement, Risikomanagement sowie die PersonalfA1/4hrung innerhalb komplexer Projekte.
The move to manage medicine from a financial perspective, i.e. managed care, has added huge layers of bureaucratic and administrative functions to healthcare. The need to have the ability to track patient medical records, mandated by government legislation such as HIPAA, is bringing new technologies and processes into the healthcare arena. A universal medical record system and absolute patient portability is a definite possibility in the not too distant future. All of these issues beg for clear IT solutions.
This book constitutes the refereed proceedings of the Second Symposium on Programs as Data Objects, PADO 2001, held in Aarhus, Denmark, in May 2001.The 14 revised full papers presented were carefully reviewed and selected from 30 submissions. Various aspects of looking at programs as data objects are covered from the point of view of program analysis, program transformation, computational complexity, etc.
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Fast Software Encryption, FSE 2000, held in New York City, USA in April 2000.The 21 revised full papers presented were carefully reviewed and selected from a total of 53 submissions. The volume presents topical sections on stream-cipher cryptanalysis, new ciphers, AES cryptanalysis, block-cipher cryptanalysis, and theoretical work.
Self-adaptive software evaluates its own behavior and changes its behavior when the evaluation indicates that the software does not accomplish what it is intended to do or when better functionality or better performance is possible. The self-adaptive approach in software engineering builds on well-known features like the use of errors and the handling of exceptions in languages like Lisp or Java and aims at improving the robustness of software systems by gradually adding new features of self-adaption and autonomity.This book originates from the First International Workshop on Self-Adaptive Software, IWSAS 2000, held in Oxford, UK in April 2000. The revised full papers presented in the volume together with an introductory survey by the volume editors assess the state of the art in this emerging new field and set the scene for future research and development work.
This book constitutes the refereed proceedings of the Fourth International Symposium on Theoretical Aspects of Computer Software, TACS 2001, held in Sendai, Japan, in October 2001. The book presents 21 selected and revised full papers. Also included are six invited papers plus one open lecture by internationally leading scientists. Among the topics addressed are automata theory, concurrency, control-flow analysis, lambda calculi, model checking and program logic.
This volume provides the formal methods practitioner with a survey of the key software specification methods. Each technique is demonstrated using the same case study - an invoicing system - to enable the reader to compare and contrast easily. Among the techniques covered are: UML, Z, SAZ, B, JSD, OMT, VHDL, Estelle, SDL and LOTOS. Most specification courses tend to focus on 1 or 2 key techniques and to have a theoretical bias; this book provides a basic overview of the main methods, and has a practical focus that allows the reader to apply their knowledge to real-life situations. It will prove essential reading for all industrial and commercial practitioners who need to expand their knowledge of software specification methods.
A presentation of what Maple can do and how it does it in the context of environmental sciences. The text includes introductory tutorials in each chapter combined with extensive marginal comments which are followed by a complete application. These include the contouring of water table data, the physical chemistry of kidney stones, and acid rain. The book also provides a special application to enable students to use "self help" in the case that Maple seem unable to do the simplest things.
This practical 'how-to'book describes all the key operations of ARIS Toolset - the market leading Business Process Modelling Tool. Using lots of screen shots and plenty of practical examples, Rob Davis shows how ARIS can be used to model 'your' business processes.Based on his experience of using ARIS in British Telecommunications plc, the author describes practical ways of using ARIS Toolset:- Explaining the models and techniques that will enable new users to start modelling quickly and effectively.- Introducing tips and short cuts which make using the tool much easier.- Giving insights into the ARIS concepts.- Explaining the rationale behind alternative ways of using the tool, their benefits and the trade-offs involved.- Tackling issues found in real projects (e.g. complex model structures, handling variety, etc), as opposed to the simple examples given in many books.In addition to describing how to use the tool, Rob Davis discusses how to create standards for using ARIS as well as giving guidance on how to use ARIS for process capture and design.Business Process Modelling with ARIS is a 'must have'for every user of ARIS.
Many problems in classical mechanics can now be readily solved using computers. This text integrates Maple, a general-purpose symbolic computation program, into the traditional sophomore- or junior-level mechanics course. Intended primarily as a supplement to a standard text, it discusses all the topics usually covered in the course and shows how to solve problems using Maple and how to display solutions graphically to gain further insight. The text is self-contained and can also be used for self-study or as the primary text in a mechanics course.
Modern business relies heavily on information technology. This book presents a new "always-on" business model for the digital age, one based on three interrelated components: a business model, an IT capability model, and an always-on information system model. In addition, it develops an implementation framework for the new model by identifying business-critical continuous computing information technologies as implementation drivers. The model proposed in this book reveals the critical role of business continuity management in ensuring business continuity even when operations are unaffected by any disasters. Using empirical survey data, PLS-SEM (Partial Least Squares - Structural Equation Modeling) combined with mediation analysis are used to test the model and hypotheses. The book is chiefly intended for students in Business Administration/Management degree programs and business leaders whose work involves addressing issues such as organizational performance, IT capability, enterprise information systems, IT management, business continuity management, disaster recovery management, risk management, IT auditing, and compliance.
Digital transformation is not about technology--it's about change. In the rapidly changing digital economy, you can't succeed by merely tweaking management practices that led to past success. And yet, while many leaders and managers recognize the threat from digital--and the potential opportunity--they lack a common language and compelling framework to help them assess it and guide them in responding. They don't know how to think about their digital business model. In this concise, practical book, MIT digital research leaders Peter Weill and Stephanie Woerner provide a powerful yet straightforward framework that has been field-tested globally with dozens of senior management teams. Based on years of study at the MIT Center for Information Systems Research (CISR), the authors find that digitization is moving companies' business models on two dimensions: from value chains to digital ecosystems, and from a fuzzy understanding of the needs of end customers to a sharper one. Looking at these dimensions in combination results in four distinct business models, each with different capabilities. The book then sets out six driving questions, in separate chapters, that help managers and executives clarify where they are currently in an increasingly digital business landscape and highlight what's needed to move toward a higher-value digital business model. Filled with straightforward self-assessments, motivating examples, and sharp financial analyses of where profits are made, this smart book will help you tackle the threats, leverage the opportunities, and create winning digital strategies.
Are you in a hurry? A friend received a letter from the American Mathematical Society (AMS) inform ing him that his paper had been accepted for publication in the Proceedings of the AMS. If he submitted it as a lt-TEX document, it would be published in 20 weeks any other format would take almost a year before the appearance in print of the article. The friend had It-T EX installed on his computer on Friday, borrowed the manu script of this book, and mailed a It-T EX version of his article to the AMS on Monday. First Steps in YI'EX is for the mathematician, physicist, engineer, scientist, or technical typist who needs to quickly learn how to write and typeset articles con taining mathematical formulas. A quick introduction to E\TE)C and the AMS enhancements is provided so that you will be ready to prepare your first article (such as the sample articles on pages 53-54 and 67-69) in only a few hours. Specific topics can be found in the table of contents, the Quick Finder, or the index. While the index is Jt.TEX -oriented, the Quick Finder lists the main topics using terminology common to wordprocessing applications. For example, to find out how to italicize text, look under italics in the Quick Finder. Setting the stage Watch someone type a mathematical article in I!lfE)C. You will see how to * Type the document using a text editor to create a Jt.TE)C source file.
Many antiquated or legacy systems are still in operation today because they are critical to the organizations continued operations or are prohibitively expensive to replace. This book guides practitioners in managing the process of legacy system evolution. The author introduces a comprehensive method for managing a software evolution project, from its conception to the deployment of the resulting system. The book helps managers answer two critical decisions: What is the best way to evolve a particular legacy system? and How can the legacy system be migrated to a selected target architecture?
wird sich in der Zukunft zeigen, welche wirtschaftlichen Potentiale im globalen Netz realisierbar sind. Die Herausgeber freuen sich, dass mit "Internet & Co im Handel" ein Buch in der Reihe "Strategisches Management fUr Konsumguterindustrie und -handel" er scheint, bei dem eine konsequente Ausrichtung auf den institutionellen Handel vorliegt. Damit wird ein Buch vorgestellt, welches den Electronic Commerce einmal aus einer anderen Perspektive betrachtet. Insbesondere der deutsche Han del steht im Bereich der Nutzung von Internettechnologien noch am Anfang. Essen, Munchen, im Friihjahr 2001 Andreas W. Bauer Gerhard Hausruckinger Reinhard Schutte Vorwort Internet & Co. im Handel - ein plakativer Titel, der die Praxisnahe des vorliegen den Buches dokumentiert. Angesichts der mittlerweile verfiigbaren Anzahl an Buchtiteln zu Themen wie Internet oder Electronic Commerce stellt sich die Frage, ob ein weiteres Buch zum Themenkomplex erforderlich ist. Die Herausge ber haben eine konsequente Ausrichtung des Themas Electronic Commerce an den Bedtirfnissen von Handelsunternehmen vorgenommen. Das Buch will damit kei nen Oberblick tiber samtliche Problemkomplexe vornehmen, vielmehr wird auf die wichtigsten Fragen von Handelsunternehmen fokussiert: welche strategischen Herausforderungen bestehen fur Handelsunternehmen, welche Geschaftsmodelle konnen von Handelsunternehmen genutzt werden, und welche Erfahrungen wur den mit dem Internet in Handelsunternehmen gemacht? Durch diese Speziali sierung aufhandelsspezifische Electronic-Commerce-Probleme wird die Differen zierung von anderen Btichern zum Thema erreicht. 1m ersten Tei des Buches werden strategische Implikationen des Electronic Commerce betrachtet. Es werden zunachst die Grundlagen und Implikationen des Electronic Commerce fur Handelsunternehmen von Dieter Ahlert skizziert."
Serviceorientierte Architektur, kurz SOA, das Zauberwort in modernen Unternehmen: Durch SOA hoffen Manager, dass Firmen flexibler, agiler, einfach schneller und unmittelbar auf Kundenwunsche eingehen konnen. Der Autor zeigt v.a. die Auswirkungen der Serviceorientierung auf Softwareentwicklung, Organisation und Prozesse. Denn die Einfuhrung einer SOA hat massive Auswirkungen auf alle Teile eines Unternehmens und seine Wertschopfungskette. Mittelfristig erfordert sie neue Kooperations- und Kommunikationsformen. Plus: die Grenzen von Services aus systemtheoretischer Sicht sowie mogliche Losungen fur sehr grosse Systeme und mobile Anwendungen."
lfimplementing systematic reuse is risky, not doing it is even more risky. Trying systematic reuse unsuccessfully can cost precious time and resources and may make management sceptical of trying it again. But if your competitors do it successfully and you do not, you may lose market share and possibly an entire market. W. B. Frakes and S. Isoda, 1994 Software companies today are faced with new and more challenging market pressures. In response to this challenge, they have to reduce the time-to-market with new or enhanced products, increase the diversity of products available to the customers, and enhance the standardisation and interoperability of the products. At the same time, many companies carry the burden of large legacy systems, that have become too expensive to maintain and cannot sustain the demands of the marketing department for alterations, leading to business opportunities being lost [BEN95]. However the systems are very valuable and cannot be simply replaced because of the costs that such an operation entails. Simply replacing them may be too expensive because of the huge volumes of on-line data that must be converted, among other reasons. |
![]() ![]() You may like...
1 Recce: Volume 3 - Onsigbaarheid Is Ons…
Alexander Strachan
Paperback
|