咨询与建议

限定检索结果

文献类型

  • 7,932 篇 会议
  • 715 册 图书

馆藏范围

  • 8,645 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 7,853 篇 工学
    • 7,485 篇 计算机科学与技术...
    • 2,796 篇 软件工程
    • 73 篇 信息与通信工程
    • 68 篇 电气工程
    • 59 篇 控制科学与工程
    • 34 篇 机械工程
    • 11 篇 建筑学
    • 8 篇 土木工程
    • 7 篇 环境科学与工程(可...
    • 7 篇 生物工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 交通运输工程
  • 2,703 篇 管理学
    • 1,785 篇 工商管理
    • 1,713 篇 管理科学与工程(可...
    • 385 篇 图书情报与档案管...
    • 86 篇 公共管理
  • 101 篇 经济学
    • 74 篇 理论经济学
    • 23 篇 应用经济学
  • 67 篇 法学
    • 64 篇 社会学
  • 67 篇 理学
    • 40 篇 数学
    • 17 篇 系统科学
    • 7 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 6 篇 物理学
  • 53 篇 教育学
    • 38 篇 教育学
    • 15 篇 心理学(可授教育学...
  • 46 篇 医学
    • 46 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 8 篇 公共卫生与预防医...
    • 5 篇 药学(可授医学、理...

主题

  • 284 篇 information syst...
  • 252 篇 computer appl. i...
  • 234 篇 business process...
  • 229 篇 software enginee...
  • 224 篇 process mining
  • 220 篇 it in business
  • 151 篇 machine learning
  • 137 篇 computer applica...
  • 134 篇 enterprise archi...
  • 129 篇 artificial intel...
  • 128 篇 bpmn
  • 121 篇 blockchain
  • 107 篇 agile
  • 91 篇 data mining
  • 90 篇 agile software d...
  • 88 篇 business process
  • 87 篇 big data
  • 84 篇 enterprise model...
  • 83 篇 e-commerce/e-bus...
  • 78 篇 data mining and ...

机构

  • 64 篇 eindhoven univ t...
  • 53 篇 univ potsdam has...
  • 44 篇 stockholm univ d...
  • 37 篇 univ tartu tartu...
  • 36 篇 free univ bozen ...
  • 34 篇 eindhoven univ t...
  • 31 篇 univ utrecht utr...
  • 23 篇 rhein westfal th...
  • 22 篇 norwegian univ s...
  • 22 篇 tu wien austria
  • 21 篇 univ politecn va...
  • 20 篇 univ ulm inst da...
  • 20 篇 vienna univ econ...
  • 20 篇 blekinge inst te...
  • 19 篇 rhein westfal th...
  • 19 篇 univ jyvaskyla j...
  • 19 篇 univ innsbruck a...
  • 19 篇 ulm univ inst da...
  • 18 篇 vrije univ amste...
  • 18 篇 sintef trondheim

作者

  • 121 篇 van der aalst wi...
  • 80 篇 sandkuhl kurt
  • 68 篇 mendling jan
  • 64 篇 reichert manfred
  • 62 篇 weske mathias
  • 42 篇 reijers hajo a.
  • 41 篇 kirikova marite
  • 38 篇 abrahamsson pekk...
  • 35 篇 stirna janis
  • 32 篇 bosch jan
  • 30 篇 joaquim filipe
  • 29 篇 jansen slinger
  • 29 篇 moe nils brede
  • 29 篇 zdravkovic jelen...
  • 27 篇 poels geert
  • 27 篇 witold abramowic...
  • 26 篇 rinderle-ma stef...
  • 26 篇 matthes florian
  • 26 篇 bider ilia
  • 26 篇 weber barbara

语言

  • 8,554 篇 英文
  • 50 篇 中文
  • 43 篇 其他
检索条件"丛书名=Lecture Notes in Business Information Processing 256"
8647 条 记 录,以下是4821-4830 订阅
排序:
Why the Development Outcome Does Not Meet the Product Owners' Expectations?  16th
Why the Development Outcome Does Not Meet the Product Owners...
收藏 引用
16th International Conference on Agile Software Development (XP)
作者: Lehtinen, Timo O. A. Virtanen, Risto Heikkila, Ville T. Itkonen, Juha Aalto Univ Sch Sci Dept Comp Sci POB 15400 FI-00076 Aalto Finland
Many software development projects fail due to problems in requirements, scope, and collaboration. This paper presents a case study of the mismatch between the expectations of Product Owners and the outcome of the dev... 详细信息
来源: 评论
information Flow-Based Security Levels Assessment for Access Control Systems  6th
Information Flow-Based Security Levels Assessment for Access...
收藏 引用
6th International MCETECH Conference on E-Technologies (MCETECH)
作者: Boulares, Sofiene Adi, Kamel Logrippo, Luigi Univ Quebec Outaouais Dept Informat & Ingn Gatineau PQ Canada
Access control systems are designed to allow or deny access to data according to organizational policies. In many organizations, the access rights of subjects to data objects are determined in consideration of clearan... 详细信息
来源: 评论
An Overview on Aspect-Oriented Requirements Engineering Area  1
收藏 引用
16th International Conference on Enterprise information Systems (ICEIS)
作者: Parreira Junior, Paulo Afonso Penteado, Rosangela Dellosso Univ Fed Sao Carlos Dept Comp Sci BR-13560 Sao Carlos SP Brazil Univ Fed Goias Comp Sci Course Jatai Go Brazil
Background: Aspect-Oriented Requirements Engineering (AORE) is a research field that aims to provide appropriate strategies for identification, modularization and composition of crosscutting concerns (also called earl... 详细信息
来源: 评论
Children and Web 2.0: What They Do, What We Fear, and What Is Done to Make Them Safe  6th
收藏 引用
6th Scandinavian Conference on information Systems
作者: Hartikainen, Heidi Iivari, Netta Kinnula, Marianne Univ Oulu Dept Informat Proc Sci Oulu Finland
Children nowadays start using Internet earlier and earlier. This has gained attention of scholars in various disciplines such as psychology, sociology, and media. Concerns about children's online safety have incre... 详细信息
来源: 评论
A Longitudinal Case Study on Risk Factor in Trust Development of Facilitated Collaboration  15
A Longitudinal Case Study on Risk Factor in Trust Developmen...
收藏 引用
15th International Conference on Group decision and negotiation (GDN)
作者: Cheng, Xusen Fu, Shixuan Peng, Yuxiang Univ Int Business & Econ Beijing 100029 Peoples R China
Computer-mediated collaboration is widely used in various organizations. Trust has proved to have an influence on online collaboration. This paper aims to conduct an in-depth investigation on an important trust factor... 详细信息
来源: 评论
Time-Driven Activity Based Costing as a Service  17th
收藏 引用
17th International Conference on Enterprise information Systems (ICEIS)
作者: Machado, Andre Mendes, Carlos da Silva, Miguel Mira Almeida, Joao INOV Lisbon Portugal Syst SA Card4B Lisbon Portugal
Due to the global economic and financial crisis the application of cost saving techniques now receives even more attention than before. Organizations are searching for new ways of cutting costs, specially Small and Me... 详细信息
来源: 评论
A Framework for Secure Migration Processes of Legacy Systems to the Cloud  1
收藏 引用
27th International Conference on Advanced information Systems Engineering (CAiSE)
作者: Marquez, Luis Rosado, David G. Mouratidis, Haralambos Mellado, Daniel Fernandez-Medina, Eduardo Spanish Natl Author Markets & Competit CNMC Madrid 28004 Spain Univ Castilla La Mancha Dept Informat Syst & Technol GSyA Res Grp E-13071 Ciudad Real Spain Univ Brighton Secure & Dependable Software Syst SenSe Brighton BN2 4GJ E Sussex England Spanish Tax Agcy Madrid 28046 Spain
The emergence of cloud computing as a major trend in the IT industry signifies that corporate users of this paradigm are confronted with the challenge of securing their systems in this new environment. An important as... 详细信息
来源: 评论
Online Compliance Monitoring of Service Landscapes  1
收藏 引用
12th International Conference on business Process Management (BPM)
作者: van der Werf, J. M. E. M. Verbeek, H. M. W. Univ Utrecht Dept Informat & Comp Sci Utrecht Netherlands Eindhoven Univ Technol Dept Math & Comp Sci NL-5600 MB Eindhoven Netherlands
Today, it is a challenging task to keep a service application running over the internet safe and secure. Based on a collection of security requirements, a so-called golden configuration can be created for such an appl... 详细信息
来源: 评论
Analytics Process Management: A New Challenge for the BPM Community  1
收藏 引用
12th International Conference on business Process Management (BPM)
作者: Heath, Fenno F. (Terry), III Hull, Richard IBM TJ Watson Res Ctr Yorktown Hts NY 10598 USA
Today, essentially all industry sectors are developing and applying "big data analytics" to gain new business insights and new operational efficiencies. Essentially two forms of analytics processing support ... 详细信息
来源: 评论
A Review and Evaluation of business Model Ontologies: A Viability Perspective  1
收藏 引用
16th International Conference on Enterprise information Systems (ICEIS)
作者: D'Souza, A. van Beest, N. R. T. P. Huitema, G. B. Wortmann, J. C. Velthuijsen, H. Hanze Univ Appl Sci Sch Commun Media & IT Groningen Netherlands Univ Groningen Dept Operat Groningen Netherlands NICTA Queensland Software Syst Res Grp Brisbane Qld 4000 Australia
Organisations are increasingly becoming interdependent in order to create and deliver superior value to their customers. The resulting business models of such organisations are becoming increasingly complex and diffic... 详细信息
来源: 评论