咨询与建议

限定检索结果

文献类型

  • 7,883 篇 会议
  • 713 册 图书

馆藏范围

  • 8,594 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 7,804 篇 工学
    • 7,436 篇 计算机科学与技术...
    • 2,796 篇 软件工程
    • 73 篇 信息与通信工程
    • 68 篇 电气工程
    • 59 篇 控制科学与工程
    • 34 篇 机械工程
    • 11 篇 建筑学
    • 8 篇 土木工程
    • 7 篇 环境科学与工程(可...
    • 7 篇 生物工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 交通运输工程
  • 2,654 篇 管理学
    • 1,785 篇 工商管理
    • 1,713 篇 管理科学与工程(可...
    • 336 篇 图书情报与档案管...
    • 86 篇 公共管理
  • 101 篇 经济学
    • 74 篇 理论经济学
    • 23 篇 应用经济学
  • 67 篇 法学
    • 64 篇 社会学
  • 67 篇 理学
    • 40 篇 数学
    • 17 篇 系统科学
    • 7 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 6 篇 物理学
  • 53 篇 教育学
    • 38 篇 教育学
    • 15 篇 心理学(可授教育学...
  • 46 篇 医学
    • 46 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 8 篇 公共卫生与预防医...
    • 5 篇 药学(可授医学、理...

主题

  • 284 篇 information syst...
  • 252 篇 computer appl. i...
  • 234 篇 business process...
  • 229 篇 software enginee...
  • 222 篇 process mining
  • 218 篇 it in business
  • 151 篇 machine learning
  • 135 篇 computer applica...
  • 135 篇 enterprise archi...
  • 128 篇 bpmn
  • 128 篇 artificial intel...
  • 120 篇 blockchain
  • 107 篇 agile
  • 91 篇 data mining
  • 90 篇 agile software d...
  • 88 篇 business process
  • 87 篇 big data
  • 84 篇 enterprise model...
  • 83 篇 e-commerce/e-bus...
  • 77 篇 data mining and ...

机构

  • 64 篇 eindhoven univ t...
  • 53 篇 univ potsdam has...
  • 43 篇 stockholm univ d...
  • 36 篇 free univ bozen ...
  • 34 篇 univ tartu tartu...
  • 34 篇 eindhoven univ t...
  • 31 篇 univ utrecht utr...
  • 23 篇 rhein westfal th...
  • 22 篇 norwegian univ s...
  • 22 篇 tu wien austria
  • 20 篇 univ ulm inst da...
  • 20 篇 vienna univ econ...
  • 20 篇 blekinge inst te...
  • 19 篇 univ jyvaskyla j...
  • 19 篇 univ innsbruck a...
  • 19 篇 ulm univ inst da...
  • 18 篇 rhein westfal th...
  • 18 篇 univ politecn va...
  • 18 篇 vrije univ amste...
  • 18 篇 sintef trondheim

作者

  • 120 篇 van der aalst wi...
  • 79 篇 sandkuhl kurt
  • 68 篇 mendling jan
  • 63 篇 reichert manfred
  • 62 篇 weske mathias
  • 41 篇 reijers hajo a.
  • 41 篇 kirikova marite
  • 38 篇 abrahamsson pekk...
  • 33 篇 stirna janis
  • 32 篇 bosch jan
  • 30 篇 joaquim filipe
  • 29 篇 jansen slinger
  • 29 篇 moe nils brede
  • 28 篇 zdravkovic jelen...
  • 27 篇 poels geert
  • 27 篇 witold abramowic...
  • 26 篇 rinderle-ma stef...
  • 26 篇 matthes florian
  • 26 篇 bider ilia
  • 26 篇 weber barbara

语言

  • 8,546 篇 英文
  • 50 篇 中文
检索条件"丛书名=Lecture Notes in Business Information Processing"
8596 条 记 录,以下是4711-4720 订阅
排序:
The Devil in the Details: Fine-Grained Enterprise Model Weaving  2
The Devil in the Details: Fine-Grained Enterprise Model Weav...
收藏 引用
27th International Conference on Advanced information Systems Engineering (CAiSE)
作者: Naranjo, David Sanchez, Mario Villalobos, Jorge Univ Los Andes Dept Syst & Comp Engn Bogota Colombia
When developing Enterprise Models, it is common to aggregate information from several partial models that describe a fragment of the enterprise. This integration is made by connecting elements from different domain mo... 详细信息
来源: 评论
Specifying Artifact-Centric business Process Models in UML  1
收藏 引用
4th International Symposium on business Modeling and Software Design (BMSD)
作者: Estanol, Montserrat Queralt, Anna Sancho, Maria-Ribera Teniente, Ernest Univ Politecn Cataluna Barcelona Spain Barcelona Supercomp Ctr Barcelona Spain
In recent years, the artifact-centric approach to process modeling has attracted a lot of attention. One of the research lines in this area is finding a suitable way to represent the dimensions in this approach. Beari... 详细信息
来源: 评论
Customer Feedback and Data Collection Techniques in Software R&D: A Literature Review  6
Customer Feedback and Data Collection Techniques in Software...
收藏 引用
6th International Conference on Software business (ICSOB)
作者: Fabijan, Aleksander Olsson, Helena Holmstrom Bosch, Jan Malmo Univ Fac Technol & Soc S-20506 Malmo Sweden Chalmers Univ Technol Dept Comp Sci & Engn S-41296 Gothenburg Sweden
In many companies, product management struggles in getting accurate customer feedback. Often, validation and confirmation of functionality with customers takes place only after the product has been deployed, and there... 详细信息
来源: 评论
Linked Data for Transaction Based Enterprise Interoperability  6
Linked Data for Transaction Based Enterprise Interoperabilit...
收藏 引用
6th International IFIP Working Conference on Enterprise Interoperability (IWEI)
作者: Folmer, Erwin Krukkert, Dennis Univ Twente POB 217 NL-7500 AE Enschede Netherlands TNO Soesterberg Netherlands
Interoperability is of major importance in B2B environments. Starting with EDI in the ` 80s, currently interoperability relies heavily on XMLbased standards. Although having great impact, still issues remain to be sol... 详细信息
来源: 评论
Facilitating Effective Stakeholder Communication in Software Development Processes
Facilitating Effective Stakeholder Communication in Software...
收藏 引用
26th International Conference on Advanced information Systems Engineering (CAiSE)
作者: Shekhovtsov, Vladimir A. Mayr, Heinrich C. Kop, Christian Alpen Adria Univ Klagenfurt Inst Appl Informat Klagenfurt Austria
Effective communication in software development is impaired when parties perceive communicated information differently. To address this problem, the project QuASE has been established. It aims at a solution that suppo... 详细信息
来源: 评论
Teaching Scrum - What We Did, What We Will Do and What Impedes Us  16th
Teaching Scrum - What We Did, What We Will Do and What Imped...
收藏 引用
16th International Conference on Agile Software Development (XP)
作者: Alegroth, Emil Burden, Hakan Ericsson, Morgan Hammouda, Imed Knauss, Eric Steghofer, Jan-Philipp Chalmers Dept Comp Sci & Engn Software Engn Div Gothenburg Sweden Univ Gothenburg Gothenburg Sweden
This paper analyses the way we teach Scrum. We reflect on our intended learning outcomes, which challenges we find in teaching Scrum and which lessons we have learned during the last four years. We also give an outloo... 详细信息
来源: 评论
Extending Participatory Design Principles to Structured User-Generated Content  6th
收藏 引用
6th Scandinavian Conference on information Systems
作者: Lukyanenko, Roman Parsons, Jeffrey Florida Int Univ Coll Business Miami FL 33199 USA Mem Univ Newfoundland Fac Business Adm St John NF Canada
The long tradition of research on participative design dates back to 1970 s and has traditionally investigated software development within organizational settings. In this context, many approaches to engaging users in... 详细信息
来源: 评论
A Duplicated Code Refactoring Advisor  16th
A Duplicated Code Refactoring Advisor
收藏 引用
16th International Conference on Agile Software Development (XP)
作者: Fontana, Francesca Arcelli Zanoni, Marco Zanoni, Francesco Univ Milano Bicocca Viale Sarca 336 I-20126 Milan Italy
Refactoring is one of the key practices in Extreme Programming and other agile methods. Duplicated code is one of the most pervasive and pungent smells to remove from source code through refactoring. Duplicated code h... 详细信息
来源: 评论
Permutation Based XML Compression  10th
Permutation Based XML Compression
收藏 引用
10th International Conference on Web information Systems and Technologies (WEBIST)
作者: Mueldner, Tomasz Miziolek, Jan Krzysztof Corbin, Tyler Acadia Univ Jodrey Sch Comp Sci Wolfville NS B4P 2A9 Canada Univ Warsaw IBI AL Warsaw Poland
An XML document D often has a regular structure, i. e., it is composed of many similarly named and structured subtrees. Therefore, the entropy of a trees structuredness should be relatively low and thus the trees shou... 详细信息
来源: 评论
A Rule-Based Approach for Detecting Location Leaks of Short Text Messages
A Rule-Based Approach for Detecting Location Leaks of Short ...
收藏 引用
18th International Workshop on business information Systems (BIS)
作者: Hoang-Quoc Nguyen-Son Minh-Triet Tran Yoshiura, Hiroshi Sonehara, Noboru Echizen, Isao SOKENDAI Tokyo Kanagawa Japan Univ Sci VNU HCM Hochiminh Vietnam Univ Electrocommun Tokyo Japan Natl Inst Informat Tokyo Japan
As of today, millions of people share messages via online social networks, some of which probably contain sensitive information. An adversary can collect these freely available messages and specifically analyze them f... 详细信息
来源: 评论