As modern softwaresystems operate in a highly dynamic context, they have to adapt their behaviour in response to changes in their operational environment or/and requirements. Triggering adaptation depends on detectin...
详细信息
Lack of hearing ability hinders deaf children from mastering grammar in language studies. Unfortunately, such software targeting Malay language is limited. This paper attempts to generate new approach in handling such...
详细信息
Dual-decomposition (DD) methods are quickly becoming important tools for estimating the minimum energy state of a graphical model. DD methods decompose a complex model into a collection of simpler subproblems that can...
详细信息
For automotive manufacturers and tier-1 suppliers, the upcoming safety standard ISO 26262 results in new requirements for the development of embedded electronics and software. In particular, the variety of driver assi...
详细信息
In this study, we introduces a classification approach using Multi-Layer Perceptron (MLP)with Back-Propagation learning algorithm and a feature selection algorithm along with biomedical test values to diagnose heart d...
详细信息
We describe "treeblazing", a method of using annotations from the GENIA treebank to constrain a parse forest from an HPSG parser. Combining this with self-training, we show significant dependency score impro...
详细信息
The success of developing service networks rely on obtaining a correct understanding of the end-to-end business processes. However, there are major concerns as to the lack of research efforts to examine methods to suc...
详细信息
ISBN:
(纸本)9789898425522
The success of developing service networks rely on obtaining a correct understanding of the end-to-end business processes. However, there are major concerns as to the lack of research efforts to examine methods to successfully manage the complexity of service networks. The insufficient communication efforts between business and technical experts results in a dissatisfactory service delivery and the inability to predict and measure the service network performance. This literature survey is initiated with purpose of finding a novel way to represent business processes in service networks and analyses the process performance. Specifically, we discuss the need to conceive tools and techniques to manage the complexity of service networks without jeopardising the performance of service networks and provide an overview of current simulation-based modelling approaches and optimising business processes.
Although services are delivered across dispersed complex service eco-systems, monitoring performance becomes a difficult task. This paper explores a number of areas to support the development of service performance an...
详细信息
ISBN:
(纸本)9789898425522
Although services are delivered across dispersed complex service eco-systems, monitoring performance becomes a difficult task. This paper explores a number of areas to support the development of service performance analytics within the discipline of service science. The paper provides a comprehensive account for the need to introduce modelling techniques to address the significant research void and explains how actor network theory (ANT) can be introduced as one of the core theories to examine service operations and performance. ANT sets out to develop an understanding on both how and why networks exist and to understand processes co-creation between human and non-human actors. By examining performance, this paper draws our attention towards the need to formulate methods to examine service network key performance indicators and the need to model service interaction, structure, and behaviour which impact on performance and consequently on service evolution.
Monotone prediction problems, in which the target variable is non-decreasing given an increase of the explanatory variables, have became more popular nowadays in many problem settings which fulfill the so-called monot...
详细信息
With the advent of cloud computing, it becomes desirable to utilize cloud computing to efficiently process complex operations on large graphs without compromising their sensitive information. This paper studies shorte...
详细信息
暂无评论