News analysis activities have been the focus of many research studies across various life domains. So often, the goal of these studies is to automatically, analyze the meaning of news, and to gauge their impact on a p...
详细信息
ISBN:
(数字)9783319527642
ISBN:
(纸本)9783319527642;9783319527635
News analysis activities have been the focus of many research studies across various life domains. So often, the goal of these studies is to automatically, analyze the meaning of news, and to gauge their impact on a particular domain. In this paper, we focus on studying sentiment analysis impact, on financial markets. Current studies, lack systematic approaches to evaluate the impact of a given sentiment dataset, in different financial contexts. We introduce a framework that encompasses models, processes, and a supporting software architecture for defining different financial contexts and conducting sentiment data-sets evaluation. The paper, describes a prototype implementation of the framework and a case study, which investigates the efficacy of the framework in evaluating the impact of a particular news sentiment dataset. The results demonstrate the capability of the framework in bridging the gap between producing a sentiment dataset and evaluating its impact in various financial contexts.
Software product evolution by means of improving their architecture, tools, or development methodologies are rather common in the lifetime of a software product. Especially if the product is in the domain of engineeri...
详细信息
ISBN:
(纸本)9783319691916;9783319691909
Software product evolution by means of improving their architecture, tools, or development methodologies are rather common in the lifetime of a software product. Especially if the product is in the domain of engineering where some of the basic calculation principles were established in some cases more than 50 years ago. However, a radical change of software products to evolve both in the software engineering as much as the organizational and business aspects in a disruptive manner are rather rare. In this paper, we report on the transformation of one of the market leader product series in water-related calculation and modeling from a traditional business-as-usual series of products to an evolutionary software ecosystem. We do so by relying on existing concepts on software ecosystem analysis to analyze the future ecosystem. We report and elaborate on the main focus points necessary for this transition. We argue for the generalization of our focus points to the transition from traditional business-as-usual software products to software ecosystems.
The cloud computing is the dream of computing used as utility that became true. It is currently emerging as a hot topic due to the important services it provides. Ensuring high quality services is a challenging task e...
详细信息
ISBN:
(纸本)9783319627373;9783319627366
The cloud computing is the dream of computing used as utility that became true. It is currently emerging as a hot topic due to the important services it provides. Ensuring high quality services is a challenging task especially with the considerable increase of the user's requests coming continuously in real time to the data center servers and consuming its resources. Abnormal users requests may contribute to the system failure. Thus, it's crucial to detect these abnormalities for further analysis and prediction. To do that, we propose the use of the outlier detection techniques in the context of the data stream mining due to the similarity between the nature of the data streams and the users requests which require analysis and mining in real time. The main contribution of this paper consists of: first, the formulation of the users requests as well as the server state as a stream of data. This data is generated from CSG(+) a cloud stream generator that we extended from CSG [1]. Second, the creation of a framework for the detection of the abnormal users requests in terms of the CPU and memory by using AnyOut and MCOD algoithms implemented within MOA (Massive Online Analysis) (http://***/) framework. Third, the comparison between them in this context.
While world-wide Mergers and Acquisitions (M&As) activity continues to accelerate, a substantial proportion of deals fails to yield the expected value. The inability to plan and implement post-merger integration o...
详细信息
ISBN:
(纸本)9783319649290;9783319649306
While world-wide Mergers and Acquisitions (M&As) activity continues to accelerate, a substantial proportion of deals fails to yield the expected value. The inability to plan and implement post-merger integration of information technology contributes substantially to these failure rates. This paper advances the argument that a company's pre-existing Enterprise Architecture decisively shapes the capability to implement post-merger IT integration and subsequently realize benefits from M&A. Our multiple-case study investigates three acquisition cases and develops an explanatory theory of how Enterprise Architecture maturity enables the implementation of distinct integration strategies. The results do not only enrich the academic literature on M&A, but also show the strategic value of Enterprise Architecture maturity.
In this paper, we propose a higher capacity steganographic approach basing on a novel mapping method. We exploit the strong energy compaction property in the Discrete Cosine Transform (DCT) to ensure a maximum embeddi...
详细信息
ISBN:
(纸本)9783319627373;9783319627366
In this paper, we propose a higher capacity steganographic approach basing on a novel mapping method. We exploit the strong energy compaction property in the Discrete Cosine Transform (DCT) to ensure a maximum embedding capacity resulting minimum embedding artifact. The approach combines the compaction efficiency with a randomized embedding behavior generated by a chaotic function PieceWise Linear Chaotic Map. The scrambled embedding positions ensures the security aspect. The mapping applied over bits enlarges the capacity of our approach by embedding symbols within DCT coefficients instead of bits.
Detecting overlapping groups is a specific challenge which offers relevant solutions for many application domains that require organizing data into non-disjoint clusters. Recently, several methods are proposed in the ...
ISBN:
(纸本)9783319627373;9783319627366
Detecting overlapping groups is a specific challenge which offers relevant solutions for many application domains that require organizing data into non-disjoint clusters. Recently, several methods are proposed in the literature giving different layouts for the overlapping boundaries between clusters. However, the assessment process to evaluate the performance of these methods still a challenging issue to deal with. In fact, existing evaluation measures for overlapping clustering do not take into account the overlap error, local to each data object, while it calculates the whole overlap size relative to all clusters. Therefore, we propose in this work a new external evaluation measure, referred to as Micro-Overlap, able to perform efficient and robust evaluation of overlapping clustering. Experiments on synthetic and real datasets show the performance of the proposed measure compared to existing ones.
Research on the process of process modeling (PPM) studies how process models are created. It typically uses the logs of the interactions with the modeling tool to assess the modeler's behavior. In this paper we su...
详细信息
ISBN:
(纸本)9783319584577;9783319584560
Research on the process of process modeling (PPM) studies how process models are created. It typically uses the logs of the interactions with the modeling tool to assess the modeler's behavior. In this paper we suggest to introduce an additional stream of data (i.e., eye tracking) to improve the analysis of the PPM. We show that, by exploiting this additional source of information, we can refine the detection of comprehension phases (introducing activities such as "semantic validation" or "problem understanding") as well as provide more exploratory visualizations (e.g., combined modeling phase diagram, heat maps, fixations distributions) both static and dynamic (i.e., movies with the evolution of the model and eye tracking data on top).
The equilibrium proposed by Nash provides a basis from which group decisions can be selected. This kind of choice establishes a situation in which none of the participants will have any incentive to change their strat...
详细信息
ISBN:
(纸本)9783319526249;9783319526232
The equilibrium proposed by Nash provides a basis from which group decisions can be selected. This kind of choice establishes a situation in which none of the participants will have any incentive to change their strategy if they are acting rationally, which is the major assumption of game theory. Leoneti proposed a utility function that allows multi-criteria problems to be modeled as games in order to find alternatives that meet the Nash equilibrium conditions for solving conflicts in group decision-making process. The objective of this research was to propose a deviation index from the theoretical rational decision (the Nash equilibrium solution) and to discuss the use of this index as an indicator of the theoretical rationality deviation. In accordance with other results presented in the literature, it was found that the group might not always choose this alternative, deviating from the equilibrium solutions, measured here by a deviation index.
The size of execution data available for process mining analysis grows several orders of magnitude every couple of years. Extracting and selecting the relevant data to be analyzed on each case represents an open chall...
详细信息
ISBN:
(纸本)9783319584577;9783319584560
The size of execution data available for process mining analysis grows several orders of magnitude every couple of years. Extracting and selecting the relevant data to be analyzed on each case represents an open challenge in the field. This paper presents a systematic literature review on different approaches to query process data and establish their provenance. In addition, a new query language is proposed, which overcomes the limitations identified during the review. The proposal is based on a combination of data and process perspectives. It provides simple constructs to intuitively formulate questions. An implementation of the language is provided, together with examples of queries to be applied on different aspects of the process analysis.
Agility has become the must have feature for small and medium sized companies (SMEs). One of the enablers of agility is the use of appropriate information technology solutions. In turn, cloud solutions have been advoc...
详细信息
ISBN:
(纸本)9783319649290;9783319649306
Agility has become the must have feature for small and medium sized companies (SMEs). One of the enablers of agility is the use of appropriate information technology solutions. In turn, cloud solutions have been advocated as the ones well suited to SMEs. Agility as a concept includes the fast reaction to changes. So, for supporting agile SMEs, the providers of cloud solutions have to be able to produce their products and services in an agile manner, so that agile adoption or acquisition of these solutions is possible. The Triple-Agile paradigm is proposed to address all three aforementioned issues of agility by stating that in a business ecosystem of SMEs and cloud service providers three types of processes should be agile: the SME processes, the service development and maintenance processes, and the service adoption/provision processes. This research in progress paper reports on the first step in the use of this paradigm, namely, it shows the conceptual outlook of the Triple-Agile paradigm applied to cloud solutions dedicated to SMEs. The conceptual outlook is illustrated by the ArchiMate language of enterprise architecture representation.
暂无评论