咨询与建议

限定检索结果

文献类型

  • 7,932 篇 会议
  • 714 册 图书

馆藏范围

  • 8,644 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 7,847 篇 工学
    • 7,476 篇 计算机科学与技术...
    • 2,831 篇 软件工程
    • 74 篇 信息与通信工程
    • 68 篇 电气工程
    • 61 篇 控制科学与工程
    • 37 篇 机械工程
    • 13 篇 建筑学
    • 11 篇 环境科学与工程(可...
    • 8 篇 土木工程
    • 7 篇 生物医学工程(可授...
    • 7 篇 生物工程
    • 6 篇 安全科学与工程
  • 2,677 篇 管理学
    • 1,797 篇 工商管理
    • 1,729 篇 管理科学与工程(可...
    • 347 篇 图书情报与档案管...
    • 86 篇 公共管理
  • 104 篇 经济学
    • 74 篇 理论经济学
    • 26 篇 应用经济学
  • 78 篇 理学
    • 47 篇 数学
    • 18 篇 系统科学
    • 11 篇 统计学(可授理学、...
    • 7 篇 物理学
    • 7 篇 生物学
  • 70 篇 法学
    • 66 篇 社会学
  • 53 篇 教育学
    • 38 篇 教育学
    • 15 篇 心理学(可授教育学...
  • 48 篇 医学
    • 48 篇 基础医学(可授医学...
    • 15 篇 临床医学
    • 9 篇 公共卫生与预防医...
    • 6 篇 药学(可授医学、理...

主题

  • 284 篇 information syst...
  • 252 篇 computer appl. i...
  • 234 篇 business process...
  • 229 篇 software enginee...
  • 222 篇 process mining
  • 220 篇 it in business
  • 152 篇 machine learning
  • 136 篇 computer applica...
  • 135 篇 enterprise archi...
  • 130 篇 artificial intel...
  • 128 篇 bpmn
  • 122 篇 blockchain
  • 107 篇 agile
  • 94 篇 data mining
  • 90 篇 agile software d...
  • 88 篇 business process
  • 87 篇 big data
  • 84 篇 enterprise model...
  • 83 篇 e-commerce/e-bus...
  • 78 篇 data mining and ...

机构

  • 64 篇 eindhoven univ t...
  • 53 篇 univ potsdam has...
  • 43 篇 stockholm univ d...
  • 36 篇 free univ bozen ...
  • 34 篇 univ tartu tartu...
  • 34 篇 eindhoven univ t...
  • 31 篇 univ utrecht utr...
  • 23 篇 rhein westfal th...
  • 22 篇 norwegian univ s...
  • 22 篇 tu wien austria
  • 20 篇 univ ulm inst da...
  • 20 篇 vienna univ econ...
  • 20 篇 blekinge inst te...
  • 19 篇 univ jyvaskyla j...
  • 19 篇 univ innsbruck a...
  • 19 篇 ulm univ inst da...
  • 18 篇 rhein westfal th...
  • 18 篇 univ politecn va...
  • 18 篇 vrije univ amste...
  • 18 篇 sintef trondheim

作者

  • 121 篇 van der aalst wi...
  • 80 篇 sandkuhl kurt
  • 68 篇 mendling jan
  • 64 篇 reichert manfred
  • 62 篇 weske mathias
  • 42 篇 reijers hajo a.
  • 41 篇 kirikova marite
  • 38 篇 abrahamsson pekk...
  • 35 篇 stirna janis
  • 32 篇 bosch jan
  • 30 篇 joaquim filipe
  • 29 篇 jansen slinger
  • 29 篇 moe nils brede
  • 29 篇 zdravkovic jelen...
  • 27 篇 poels geert
  • 27 篇 witold abramowic...
  • 26 篇 rinderle-ma stef...
  • 26 篇 matthes florian
  • 26 篇 bider ilia
  • 26 篇 weber barbara

语言

  • 8,500 篇 英文
  • 96 篇 其他
  • 50 篇 中文
检索条件"丛书名=Lecture Notes in Business Information Processing"
8646 条 记 录,以下是3841-3850 订阅
排序:
Introducing Fundamental Concepts of Process Modeling Through Participatory Simulation  29th
Introducing Fundamental Concepts of Process Modeling Through...
收藏 引用
29th International Conference on Advanced information Systems Engineering (CAiSE)
作者: Oppl, Stefan Hoppenbrouwers, Stijn Radboud Univ Nijmegen Dept Software Sci Toernooiveld 212 NL-6525 EC Nijmegen Netherlands Johannes Kepler Univ Linz Dept Business Informat Syst Commun Engn Altenberger Str 69 A-4040 Linz Austria HAN Univ Appl Sci Model Based IS Grp Ruitenberglaan 26 NL-6802 CE Arnhem Netherlands
Due to the ubiquitous deployment of information systems in today's organizational work settings, the importance of process modeling skills is undisputed not only for techno-centric roles in organizations, but also... 详细信息
来源: 评论
Dereferencing Service for Navigating Enterprise Knowledge Structures from Diagrammatic Representations  20th
Dereferencing Service for Navigating Enterprise Knowledge St...
收藏 引用
20th International Conference on business information Systems (BIS)
作者: Cinpoeru, Mihai Babes Bolyai Univ Business Informat Res Ctr Cluj Napoca Romania
This paper aims to offer a straightforward solution to the need of cross-diagram semantic navigation in business diagrams while it also emphasizes the potential and importance of a core Linked Data concept which has y... 详细信息
来源: 评论
An Observation Method for Behavioral Analysis of Collaborative Modeling Skills  29th
An Observation Method for Behavioral Analysis of Collaborati...
收藏 引用
29th International Conference on Advanced information Systems Engineering (CAiSE)
作者: Wilmont, Ilona Hoppenbrouwers, Stijn Barendsen, Erik Radboud Univ Nijmegen Inst Comp & Informat Sci POB 9010 NL-6500 GL Nijmegen Netherlands HAN Univ Appl Sci POB 2217 NL-6802 CE Arnhem Netherlands
Process modeling skills are strongly subject to individual differences in cognitive abilities. However, we lack systematic methods to analyze how psychological mechanisms facilitating cognition influence modeling skil... 详细信息
来源: 评论
Continuous Requirements Engineering Support Environment Model in Methodologically Heterogeneous Projects  20th
Continuous Requirements Engineering Support Environment Mode...
收藏 引用
20th International Conference on business information Systems (BIS)
作者: Finke, Anita Riga Tech Univ Daugavgrivas Iela 2 Riga Latvia
In the result of scientific and technological evolution in Software and Requirements Engineering fields many techniques, methods and tools have been developed to support our daily work. Most of them are more suited fo... 详细信息
来源: 评论
Compliance Verification Algorithm for Computer Systems Security Policies  7th
Compliance Verification Algorithm for Computer Systems Secur...
收藏 引用
7th International MCETECH Conference on E-Technologies
作者: Pene, Liviu Hamza, Lamia Adi, Kamel Univ Quebec Outaouais Comp Secur Res Lab Gatineau PQ Canada Univ Bejaia Lab Informat Med Bejaia Algeria
This paper proposes an algebraic formalism and a dedicated logic for computer systems and security policies specifications. A tableau-based proof system is then developed for assessing whether policies are satisfied f... 详细信息
来源: 评论
A New FDD-Based Method for Distributed Firewall Misconfigurations Resolution  14th
A New FDD-Based Method for Distributed Firewall Misconfigura...
收藏 引用
14th European, Mediterranean, and Middle Eastern Conference (EMCIS)
作者: Saadaoui, Amina Ben Souayeh, Nihel Ben Youssef Bouhoula, Adel Univ Carthage Higher Sch Commun SupCom Digital Secur Res Unit Tunis Tunisia
Firewall is one of the most commonly used techniques to protect a network, it limits or provides access to specific network segments based on a set of filtering rules that should be configured with respect to the glob... 详细信息
来源: 评论
Feature Selection Approaches to Fraud Detection in e-Payment Systems  17th
Feature Selection Approaches to Fraud Detection in e-Payment...
收藏 引用
17th International Conference on E-Commerce and Web Technologies (EC-Web)
作者: Lima, Rafael Franca Pereira, Adriano C. M. Fed Univ Minas Gerais UFMG Dept Comp Sci DCC BR-31270901 Belo Horizonte MG Brazil
Due to the large amount of data generated in electronic transactions, to find the best set of features is an essential task to identify frauds. Fraud detection is a specific application of anomaly detection, character... 详细信息
来源: 评论
How is Security Testing Done in Agile Teams? A Cross-Case Analysis of Four Software Teams  1
收藏 引用
8th International Conference on Agile Processes in Software Engineering and Extreme Programming (XP)
作者: Cruzes, Daniela Soares Felderer, Michael Oyetoyan, Tosin Daniel Gander, Matthias Pekaric, Irdin SINTEF Digital Trondheim Norway Univ Innsbruck Innsbruck Austria
Security testing can broadly be described as (1) the testing of security requirements that concerns confidentiality, integrity, availability, authentication, authorization, nonrepudiation and (2) the testing of the so... 详细信息
来源: 评论
Method and Practical Guidelines for Overcoming Enterprise Architecture Adoption Challenges  18th
Method and Practical Guidelines for Overcoming Enterprise Ar...
收藏 引用
18th International Conference on Enterprise information Systems (ICEIS)
作者: Syynimaa, Nestori Univ Jyvaskyla Fac Informat Technol Dept Comp Sci & Informat Syst Jyvaskyla Finland Gerenios Ltd Tampere Finland
During the last few years, interest towards Enterprise Architecture (EA) has increased, not least due to anticipated benefits resulting from adopting it. For instance, EA has been argued to provide cost reduction, tec... 详细信息
来源: 评论
Crowd and Experts' Knowledge: Connection and Value Through the Notion of Prism  14th
Crowd and Experts' Knowledge: Connection and Value Through t...
收藏 引用
14th European, Mediterranean, and Middle Eastern Conference (EMCIS)
作者: Bonazzi, Riccardo Viscusi, Gianluigi Barbey, Valerie HES SO Valais Wallis Sierre Switzerland Ecole Polytech Fed Lausanne EPFL CDM MTEI CSI ODY 1 16 Odyssea Stn 5 CH-1015 Lausanne Switzerland
Crowdsourcing is an online activity in which an individual, an institution, a non-profit organization, or company proposes to a group of individuals of varying knowledge, heterogeneity, and number, via a flexible open... 详细信息
来源: 评论