咨询与建议

限定检索结果

文献类型

  • 7,883 篇 会议
  • 714 册 图书

馆藏范围

  • 8,595 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 7,804 篇 工学
    • 7,436 篇 计算机科学与技术...
    • 2,796 篇 软件工程
    • 73 篇 信息与通信工程
    • 68 篇 电气工程
    • 59 篇 控制科学与工程
    • 34 篇 机械工程
    • 11 篇 建筑学
    • 8 篇 土木工程
    • 7 篇 环境科学与工程(可...
    • 7 篇 生物工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 交通运输工程
  • 2,654 篇 管理学
    • 1,785 篇 工商管理
    • 1,713 篇 管理科学与工程(可...
    • 336 篇 图书情报与档案管...
    • 86 篇 公共管理
  • 101 篇 经济学
    • 74 篇 理论经济学
    • 23 篇 应用经济学
  • 67 篇 法学
    • 64 篇 社会学
  • 67 篇 理学
    • 40 篇 数学
    • 17 篇 系统科学
    • 7 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 6 篇 物理学
  • 53 篇 教育学
    • 38 篇 教育学
    • 15 篇 心理学(可授教育学...
  • 46 篇 医学
    • 46 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 8 篇 公共卫生与预防医...
    • 5 篇 药学(可授医学、理...

主题

  • 284 篇 information syst...
  • 248 篇 computer appl. i...
  • 234 篇 business process...
  • 229 篇 software enginee...
  • 213 篇 process mining
  • 212 篇 it in business
  • 147 篇 enterprise archi...
  • 146 篇 machine learning
  • 136 篇 computer applica...
  • 128 篇 bpmn
  • 122 篇 artificial intel...
  • 107 篇 agile
  • 107 篇 blockchain
  • 91 篇 data mining
  • 90 篇 agile software d...
  • 88 篇 business process
  • 87 篇 big data
  • 81 篇 e-commerce/e-bus...
  • 81 篇 enterprise model...
  • 79 篇 case study

机构

  • 64 篇 eindhoven univ t...
  • 53 篇 univ potsdam has...
  • 43 篇 stockholm univ d...
  • 36 篇 free univ bozen ...
  • 34 篇 univ tartu tartu...
  • 34 篇 eindhoven univ t...
  • 31 篇 univ utrecht utr...
  • 23 篇 rhein westfal th...
  • 22 篇 norwegian univ s...
  • 22 篇 tu wien austria
  • 20 篇 univ ulm inst da...
  • 20 篇 vienna univ econ...
  • 20 篇 blekinge inst te...
  • 19 篇 univ jyvaskyla j...
  • 19 篇 univ innsbruck a...
  • 19 篇 ulm univ inst da...
  • 18 篇 rhein westfal th...
  • 18 篇 univ politecn va...
  • 18 篇 vrije univ amste...
  • 18 篇 sintef trondheim

作者

  • 119 篇 van der aalst wi...
  • 79 篇 sandkuhl kurt
  • 68 篇 mendling jan
  • 63 篇 reichert manfred
  • 62 篇 weske mathias
  • 41 篇 reijers hajo a.
  • 40 篇 kirikova marite
  • 38 篇 abrahamsson pekk...
  • 32 篇 bosch jan
  • 32 篇 stirna janis
  • 32 篇 zdravkovic jelen...
  • 30 篇 joaquim filipe
  • 29 篇 jansen slinger
  • 29 篇 moe nils brede
  • 27 篇 poels geert
  • 27 篇 witold abramowic...
  • 26 篇 rinderle-ma stef...
  • 26 篇 matthes florian
  • 26 篇 bider ilia
  • 26 篇 weber barbara

语言

  • 8,500 篇 英文
  • 50 篇 中文
  • 47 篇 其他
检索条件"丛书名=Lecture Notes in Business Information Processing"
8597 条 记 录,以下是1051-1060 订阅
排序:
Building User Journey Games from Multi-party Event Logs
Building User Journey Games from Multi-party Event Logs
收藏 引用
4th International Conference on Process Mining (ICPM)
作者: Kobialka, Paul Mannhardt, Felix Tarifa, Silvia Lizeth Tapia Johnsen, Einar Broch Univ Oslo Oslo Norway Eindhoven Univ Technol Eindhoven Netherlands
To improve the user experience, service providers may systematically record and analyse user interactions with a service using event logs. User journeys model these interactions from the user's perspective. They c... 详细信息
来源: 评论
A Distributed Multi-key Generation Protocol with a New Complaint Management Strategy  19th
A Distributed Multi-key Generation Protocol with a New Compl...
收藏 引用
19th European, Mediterranean, and Middle Eastern Conference (EMCIS)
作者: Kalai, Rym Neji, Wafa Ben Rajeb, Narjes Univ Tunis El Manar LIPSIC Lab Fac Sci Tunis Tunis Tunisia Higher Inst Technol Studies Beja Gen Directorate Technol Studies LIPSIC Lab Beja Tunisia Univ Carthage Natl Inst Appl Sci & Technol LIPSIC Lab Tunis Tunisia
Privacy protection is a main goal in the majority of the Blockchain studies. However some dishonest users may abuse from the benefits of this property and the fact of not being identified to do illegal crimes. That is... 详细信息
来源: 评论
The RAI Way: A Technical Analysis and Design Method for Building Enterprise Semantic Layers  1
收藏 引用
35th International Conference on Advanced information Systems Engineering (CAiSE)
作者: Stirewalt, R. E. K. Bur, Marton RelationalAl Inc Berkeley CA 94704 USA
The enterprise-wide semantic layer is the Holy Grail of data management. Unlike a data lake or data warehouse, semantic layers promise to democratize access across an organization. Traditional implementations tailor t... 详细信息
来源: 评论
Security Risk Assessment of Blockchain-Based Patient Health Record Systems  19th
Security Risk Assessment of Blockchain-Based Patient Health ...
收藏 引用
19th European, Mediterranean, and Middle Eastern Conference (EMCIS)
作者: Al Barghuthi, Nedaa B. Said, Huwida E. Badi, Sulafa M. Girija, Shini Higher Coll Technol Sharjah U Arab Emirates Zayed Univ Dubai U Arab Emirates British Univ Dubai Dubai U Arab Emirates
Blockchain technology is receiving greater attention for enhancing the security of patient records systems;however, it is not a panacea, as many security risks have been found in these healthcare applications. This st... 详细信息
来源: 评论
A Combined Approach of Process Mining and Rule-Based AI for Study Planning and Monitoring in Higher Education
A Combined Approach of Process Mining and Rule-Based AI for ...
收藏 引用
4th International Conference on Process Mining (ICPM)
作者: Wagner, Miriam Helal, Hayyan Roepke, Rene Judel, Sven Doveren, Jens Goerzen, Sergej Soudmand, Pouya Lakemeyer, Gerhard Schroeder, Ulrik van der Aalst, Wil M. P. Rhein Westfal TH Aachen PADS Aachen Germany Rhein Westfal TH Aachen Knowledge Based Syst Grp Aachen Germany Rhein Westfal TH Aachen Learning Technol Res Grp Aachen Germany
This paper presents an approach of using methods of process mining and rule-based artificial intelligence to analyze and understand study paths of students based on campus management system data and study program mode... 详细信息
来源: 评论
Beyond Temporal Dependency: An Ontology-Based Approach to Modeling Causal Structures in business Processes  24th
Beyond Temporal Dependency: An Ontology-Based Approach to Mo...
收藏 引用
24th International Working Conference on business Process Modeling, Development, and Support (BPMDS) / 28th International Working Conference on Exploring Modeling Methods for Systems Analysis and Development (EMMSAD)
作者: Andree, Kerstin Bano, Dorina Weske, Mathias Tech Univ Munich Heilbronn Germany Univ Potsdam Hasso Plattner Inst Potsdam Germany
Causality is an ubiquitous but elusive concept describing the relationship between cause and effect. In the context of business processes, it defines ontological, i.e., existential, and temporal dependencies between a... 详细信息
来源: 评论
Efficient Computation of Behavioral Changes in Declarative Process Models  24th
Efficient Computation of Behavioral Changes in Declarative P...
收藏 引用
24th International Working Conference on business Process Modeling, Development, and Support (BPMDS) / 28th International Working Conference on Exploring Modeling Methods for Systems Analysis and Development (EMMSAD)
作者: Schutzenmeier, Nicolai Corea, Carl Delfmann, Patrick Jablonski, Stefan Univ Bayreuth Inst Comp Sci Bayreuth Germany Univ Koblenz Inst IS Res Koblenz Germany
Modelling processes with declarative process models, i.e. sets of constraints, allows for a great degree of flexibility in process execution. However, having behavior specified by means of symbolic (textual) constrain... 详细信息
来源: 评论
Developing a Maturity Assessment Tool to Enable the Management of Artificial Intelligence for Organizations  1
收藏 引用
35th International Conference on Advanced information Systems Engineering (CAiSE)
作者: Fukas, Philipp Bozkurt, Aydin Lenz, Nora Thomas, Oliver Osnabruck Univ Osnabruck Lower Saxony Germany German Res Ctr Artificial Intelligence Osnabruck Lower Saxony Germany Strateg GmbH Osnabruck Lower Saxony Germany
Maturity Models (MMs) are a popular method to support information Technology (IT) management. In recent years, several industry-specific Artificial Intelligence (AI) MMs were developed to support AI Management as part... 详细信息
来源: 评论
Cybersecurity and Data Quality in Cloud Computing: A Research Framework  19th
Cybersecurity and Data Quality in Cloud Computing: A Researc...
收藏 引用
19th European, Mediterranean, and Middle Eastern Conference (EMCIS)
作者: Xu, Hongjiang Butler Univ Sch Business 4600 Sunset Ave Indianapolis IN 46208 USA
In the cloud computing environment, cybersecurity and data quality capacities and vulnerabilities can have impact on could computing performance. Cloud computing resiliency addresses risks and capabilities in order to... 详细信息
来源: 评论
Deriving Event Logs from Legacy Software Systems
Deriving Event Logs from Legacy Software Systems
收藏 引用
4th International Conference on Process Mining (ICPM)
作者: Breitmayer, Marius Arnold, Lisa La Rocca, Stephan Reichert, Manfred Ulm Univ Inst Databases & Informat Syst Ulm Germany PITSS GmbH Stuttgart Stuttgart Germany
The modernization of legacy software systems is one of the key challenges in software industry, which requires comprehensive system analysis. In this context, process mining has proven to be useful for understanding t... 详细信息
来源: 评论