咨询与建议

限定检索结果

文献类型

  • 7,932 篇 会议
  • 714 册 图书

馆藏范围

  • 8,644 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 7,847 篇 工学
    • 7,476 篇 计算机科学与技术...
    • 2,831 篇 软件工程
    • 74 篇 信息与通信工程
    • 68 篇 电气工程
    • 61 篇 控制科学与工程
    • 37 篇 机械工程
    • 13 篇 建筑学
    • 11 篇 环境科学与工程(可...
    • 8 篇 土木工程
    • 7 篇 生物医学工程(可授...
    • 7 篇 生物工程
    • 6 篇 安全科学与工程
  • 2,677 篇 管理学
    • 1,797 篇 工商管理
    • 1,729 篇 管理科学与工程(可...
    • 347 篇 图书情报与档案管...
    • 86 篇 公共管理
  • 104 篇 经济学
    • 74 篇 理论经济学
    • 26 篇 应用经济学
  • 78 篇 理学
    • 47 篇 数学
    • 18 篇 系统科学
    • 11 篇 统计学(可授理学、...
    • 7 篇 物理学
    • 7 篇 生物学
  • 70 篇 法学
    • 66 篇 社会学
  • 53 篇 教育学
    • 38 篇 教育学
    • 15 篇 心理学(可授教育学...
  • 48 篇 医学
    • 48 篇 基础医学(可授医学...
    • 15 篇 临床医学
    • 9 篇 公共卫生与预防医...
    • 6 篇 药学(可授医学、理...

主题

  • 284 篇 information syst...
  • 252 篇 computer appl. i...
  • 234 篇 business process...
  • 229 篇 software enginee...
  • 222 篇 process mining
  • 220 篇 it in business
  • 152 篇 machine learning
  • 136 篇 computer applica...
  • 135 篇 enterprise archi...
  • 130 篇 artificial intel...
  • 128 篇 bpmn
  • 122 篇 blockchain
  • 107 篇 agile
  • 94 篇 data mining
  • 90 篇 agile software d...
  • 88 篇 business process
  • 87 篇 big data
  • 84 篇 enterprise model...
  • 83 篇 e-commerce/e-bus...
  • 78 篇 data mining and ...

机构

  • 64 篇 eindhoven univ t...
  • 53 篇 univ potsdam has...
  • 43 篇 stockholm univ d...
  • 36 篇 free univ bozen ...
  • 34 篇 univ tartu tartu...
  • 34 篇 eindhoven univ t...
  • 31 篇 univ utrecht utr...
  • 23 篇 rhein westfal th...
  • 22 篇 norwegian univ s...
  • 22 篇 tu wien austria
  • 20 篇 univ ulm inst da...
  • 20 篇 vienna univ econ...
  • 20 篇 blekinge inst te...
  • 19 篇 univ jyvaskyla j...
  • 19 篇 univ innsbruck a...
  • 19 篇 ulm univ inst da...
  • 18 篇 rhein westfal th...
  • 18 篇 univ politecn va...
  • 18 篇 vrije univ amste...
  • 18 篇 sintef trondheim

作者

  • 121 篇 van der aalst wi...
  • 80 篇 sandkuhl kurt
  • 68 篇 mendling jan
  • 64 篇 reichert manfred
  • 62 篇 weske mathias
  • 42 篇 reijers hajo a.
  • 41 篇 kirikova marite
  • 38 篇 abrahamsson pekk...
  • 35 篇 stirna janis
  • 32 篇 bosch jan
  • 30 篇 joaquim filipe
  • 29 篇 jansen slinger
  • 29 篇 moe nils brede
  • 29 篇 zdravkovic jelen...
  • 27 篇 poels geert
  • 27 篇 witold abramowic...
  • 26 篇 rinderle-ma stef...
  • 26 篇 matthes florian
  • 26 篇 bider ilia
  • 26 篇 weber barbara

语言

  • 8,500 篇 英文
  • 96 篇 其他
  • 50 篇 中文
检索条件"丛书名=Lecture Notes in Business Information Processing"
8646 条 记 录,以下是1131-1140 订阅
排序:
Mining Contextual Process Models Using Sensors Data: A Case of Daily Activities in Smart Home  19th
Mining Contextual Process Models Using Sensors Data: A Case ...
收藏 引用
19th European, Mediterranean, and Middle Eastern Conference (EMCIS)
作者: Elali, Ramona Kornyshova, Elena Deneckere, Rebecca Salinesi, Camille Paris 1 Pantheon Sorbonne Paris France Conservatoire Natl Arts & Metiers Paris France
Different techniques are used by companies to enhance their processes. Process mining (PM) is one of these techniques that relies on the user activity logs recorded by information systems to discover the process model... 详细信息
来源: 评论
BERMUDA: Participatory Mapping of Domain Activities to Event Data via System Interfaces
BERMUDA: Participatory Mapping of Domain Activities to Event...
收藏 引用
4th International Conference on Process Mining (ICPM)
作者: Cosma, Vlad P. Hildebrandt, Thomas T. Gyldenkaerne, Christopher H. Slaats, Tijs Univ Copenhagen DK-2200 Copenhagen Denmark KMD ApS DK-2750 Ballerup Denmark Roskilde Univ Roskilde Denmark
We present a method and prototype tool supporting participatory mapping of domain activities to event data recorded in information systems via the system interfaces. The aim is to facilitate responsible secondary use ... 详细信息
来源: 评论
Adaptive Task-Oriented Chatbots Using Feature-Based Knowledge Bases  1
收藏 引用
35th CAiSE Conference on Cyber-Human Systems
作者: Campas, Carla Motger, Quim Franch, Xavier Marco, Jordi Univ Politecn Cataluna Dept Serv & Informat Syst Engn Barcelona Spain Univ Politecn Cataluna Dept Comp Sci Barcelona Spain
Task-oriented chatbots relying on a knowledge base for domain-specific content exploitation have been largely addressed in research and industry applications. Despite this, multiple challenges remain to be fully conqu... 详细信息
来源: 评论
A Goal-Driven Approach to Support Decision-Making with Incomplete information in Cyber Operations  1
收藏 引用
35th CAiSE Conference on Cyber-Human Systems
作者: Dawoud, Ahmed Mahala, Geeta Islam, Chadni Mayer, Wolfgang Ghose, Aditya Ali Babar, M. Stumptner, Markus Grossmann, Georg Univ South Australia Adelaide SA Australia Univ Wollongong Wollongong NSW Australia Univ Adelaide Adelaide SA Australia
Semi-autonomous cyber security ("cyber") operations require effective communication between a human operator and the underlying cyber systems that carry out the mission. We show a goal-driven approach to spe... 详细信息
来源: 评论
Local Energy Markets: A Market Transformation Survey Towards Segments of Interest  19th
Local Energy Markets: A Market Transformation Survey Towards...
收藏 引用
19th European, Mediterranean, and Middle Eastern Conference (EMCIS)
作者: Kapassa, Evgenia Touloupou, Marios Univ Nicosia Dept Digital Innovat Nicosia Cyprus
Given the rapid growth of distributed energy generation and the anticipated rise in demand-response, one of the most important issues is how to integrate the energy resources into the existing market. The energy secto... 详细信息
来源: 评论
Identifying the Steps in an Exploratory Data Analysis: A Process-Oriented Approach
Identifying the Steps in an Exploratory Data Analysis: A Pro...
收藏 引用
4th International Conference on Process Mining (ICPM)
作者: Van Daele, Seppe Janssenswillen, Gert UHasselt Hasselt Univ Fac Business Econ Agoralaan B-3590 Diepenbeek Belgium
Best practices in (teaching) data literacy, specifically Exploratory Data Analysis, remain an area of tacit knowledge until this day. However, with the increase in the amount of data and its importance in organisation... 详细信息
来源: 评论
Domain-Driven Event Abstraction Framework for Learning Dynamics in MOOCs Sessions
Domain-Driven Event Abstraction Framework for Learning Dynam...
收藏 引用
4th International Conference on Process Mining (ICPM)
作者: Hidalgo, Luciano Munoz-Gama, Jorge Pontificia Univ Catolica Chile Dept Comp Sci Santiago Chile
In conjunction with the rapid expansion of Massive Open Online Courses (MOOCs), academic interest has grown in the analysis of MOOC student study sessions. Education researchers have increasingly regarded process mini... 详细信息
来源: 评论
Cybersecurity and Data Quality in Cloud Computing: A Research Framework  19th
Cybersecurity and Data Quality in Cloud Computing: A Researc...
收藏 引用
19th European, Mediterranean, and Middle Eastern Conference (EMCIS)
作者: Xu, Hongjiang Butler Univ Sch Business 4600 Sunset Ave Indianapolis IN 46208 USA
In the cloud computing environment, cybersecurity and data quality capacities and vulnerabilities can have impact on could computing performance. Cloud computing resiliency addresses risks and capabilities in order to... 详细信息
来源: 评论
Modeling, Executing and Monitoring IoT-Driven business Rules  24th
Modeling, Executing and Monitoring IoT-Driven Business Rules
收藏 引用
24th International Working Conference on business Process Modeling, Development, and Support (BPMDS) / 28th International Working Conference on Exploring Modeling Methods for Systems Analysis and Development (EMMSAD)
作者: Kirikkayis, Yusuf Gallik, Florian Reichert, Manfred Ulm Univ Inst Databases & Informat Syst Ulm Germany
The Internet of Things (IoT) is used in various areas to ease daily life and to make it more efficient. The IoT is a network of physical objects equipped with sensors, actuators, software, and technologies for exchang... 详细信息
来源: 评论
Detecting Complex Anomalous Behaviors in business Processes: A Multi-perspective Conformance Checking Approach
Detecting Complex Anomalous Behaviors in Business Processes:...
收藏 引用
4th International Conference on Process Mining (ICPM)
作者: Mehr, Azadeh Sadat Mozafari de Carvalho, Renata M. van Dongen, Boudewijn Eindhoven Univ Technol Dept Math & Comp Sci Eindhoven Netherlands
In recent years, organizations are putting an increasing emphasis on anomaly detection. Anomalies in business processes can be an indicator of system faults, inefficiencies, or even fraudulent activities. In this pape... 详细信息
来源: 评论