Journal articles on the topic 'Reengineering of corporate computer networks'

To see the other types of publications on this topic, follow the link: Reengineering of corporate computer networks.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Reengineering of corporate computer networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Butler, Charles W., Earl D. Hodil, and Gary L. Richardson. "Software reengineering." Data Processing 28, no. 6 (July 1986): 303–7. http://dx.doi.org/10.1016/0011-684x(86)90231-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

BERZTISS, ALFS T. "REVERSE ENGINEERING, REENGINEERING, AND CONCURRENT ENGINEERING OF SOFTWARE." International Journal of Software Engineering and Knowledge Engineering 05, no. 02 (June 1995): 299–324. http://dx.doi.org/10.1142/s0218194095000150.

Full text
Abstract:
This survey reviews four classes of reengineering of software systems: code restructuring and translation of code into a new language, design recovery for corrective maintenance, design recovery for software enhancement, and software reengineering as part of radical business process reengineering. Special attention is given to the reengineering of data bases and user interfaces. We also consider concurrent software engineering, its place in the software reengineering process, and groupware in support of this process.
APA, Harvard, Vancouver, ISO, and other styles
3

Hoekstra, Rinke. "The knowledge reengineering bottleneck." Semantic Web 1, no. 1,2 (2010): 111–15. http://dx.doi.org/10.3233/sw-2010-0004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Solomon, Esther. "The dynamics of corporate change: management's evaluation of stakeholder characteristics." Human Systems Management 20, no. 3 (September 3, 2001): 257–65. http://dx.doi.org/10.3233/hsm-2001-20308.

Full text
Abstract:
In an era of globalization, rapid technological changes and intense competition, new forms of organizational designs and networks have replaced traditional forms of organizations. Interconnections among businesses and their various stakeholders including suppliers, customers providers, employees and others are now more rapid and complex as they are facilitated by advanced information technology and systems. This research addresses these changes by examining managers' perceptions of the stakeholders that were viewed as responsible for initiating change and innovation in their respective organizations. This paper presents the results of an empirical research project of 218 managers from major companies. Particular focus is placed on identifying which specific groups were critical stakeholders for the changes, and assessing their legitimacy, power and authority in relation to specific change initiatives and outcomes. Implications of the findings are discussed regarding process changes and reengineering within organizations and business networks.
APA, Harvard, Vancouver, ISO, and other styles
5

Richardson, Ted. "Future for corporate networks." Data Processing 27, no. 6 (July 1985): 37–40. http://dx.doi.org/10.1016/0011-684x(85)90271-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Beskorovainyi, Vladimir V., Lubomyr B. Petryshyn, and Vasyl О. Honcharenko. "Mathematical models of a multi-criteria problem of reengineering topological structures of ecological monitoring networks." Applied Aspects of Information Technology 5, no. 1 (April 17, 2022): 11–24. http://dx.doi.org/10.15276/aait.05.2022.1.

Full text
Abstract:
The article deals with the theoretical aspects of the problem of reengineering the topological structures of terrestrial ecological monitoring networks. As a result of the analysis of the current state of the problem, it was revealed the need to change the network of monitoring points, to increase requirements for the efficiency and accuracy of observations, as well as to do the more advanced technologies for collecting, processing, storing and transmitting information. All this is possible due to reengineering of existing monitoring networks. This requires the improvement of network system optimization technologies and their software in terms of taking into account the features of the reengineering problem, as well as the mathematical models and methods used for this. To solve the problem of reengineering of terrestrial monitoring networks, an aggregative-decomposition approach is proposed. The approach is divided into a set of tasks considering their interconnections in terms of input and output data. This made it possible to define a set of tasks that form the basis of reengineering procedures. To increase the efficiency of technologies for computer-aided design and reengineering of networks, a set of mathematical models is proposed that covers the main stages of their life cycles. The article discusses: a systemological model of iterative technology for obtaining design solutions; analytical models for evaluating the properties of network reengineering options in terms of efficiency, reliability, survivability and costs; models for identifying effective options for network reengineering based on Karlin and Germeier theorems; a model for evaluating the local properties of options in the form of a utility function of local criteria; model of scalar multicriteria estimation of network reengineering options based on utility theory. The utility function makes it possible to implement both linear and non-linear (including Z- and S-shaped) dependencies on their values. For the practical implementation of models of multicriteria problems of reengineering of topological structures of networks, it is proposed to use the method of generation of effective design solutions in parallel with the generation and the method of comparator parametric synthesis of the scalar multicriteria estimation function. The performance and efficiency of the proposed mathematical models and methods are demonstrated by examples of solving the problems of subset selection of Paretooptimal options for building networks and parametric synthesis of the scalar multicriteria estimation function. The application in practice of the proposed set of models and methods will increase the degree of automation of network reengineering processes, reduce the time for solving the problem of multi-criteria choice due to the reduction in the time complexity of the analysis procedures, and increase the stability of the decisions made by compromising their choice only from a subset of effective ones.
APA, Harvard, Vancouver, ISO, and other styles
7

Best, Eike, and Raymond Devillers. "Synthesis and reengineering of persistent systems." Acta Informatica 52, no. 1 (November 29, 2014): 35–60. http://dx.doi.org/10.1007/s00236-014-0209-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

CANFORA, GERARDO, ANDREA DE LUCIA, and GIUSEPPE A. DI LUCCA. "AN INCREMENTAL OBJECT-ORIENTED MIGRATION STRATEGY FOR RPG LEGACY SYSTEMS." International Journal of Software Engineering and Knowledge Engineering 09, no. 01 (February 1999): 5–25. http://dx.doi.org/10.1142/s0218194099000036.

Full text
Abstract:
We present a strategy for incrementally migrating legacy systems to object-oriented platforms. The migration process consists of six sequential phases and encompasses reverse engineering and reengineering activities. The aim of reverse engineering is to decompose programs into components implementing the user interface and components implementing application domain objects. The identification of objects is centred around persistent data stores and exploits object-oriented design metrics. Wrapping is the core of the reengineering activities. It makes new systems able to exploit existing resources, thus allowing an incremental and selective replacement of the identified objects. The migration strategy has been defined and experimented within the project ERCOLE (Encapsulation, Reengineering and Coexistence of Object with Legacy) on legacy systems developed in RPG for the IBM AS/400 environment.
APA, Harvard, Vancouver, ISO, and other styles
9

Newman, P. "ATM technology for corporate networks." IEEE Communications Magazine 30, no. 4 (April 1992): 90–101. http://dx.doi.org/10.1109/35.135793.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barua, Anitesh, C. H. Sophie Lee, and Andrew B. Whinston. "The Calculus of Reengineering." Information Systems Research 7, no. 4 (December 1996): 409–28. http://dx.doi.org/10.1287/isre.7.4.409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

MERLO, ETTORE, JEAN-FRANCOIS GIRARD, LAURIE HENDREN, and R. DE MORI. "MULTI-VALUED CONSTANT PROPAGATION ANALYSIS FOR USER INTERFACE REENGINEERING." International Journal of Software Engineering and Knowledge Engineering 05, no. 01 (March 1995): 5–23. http://dx.doi.org/10.1142/s0218194095000022.

Full text
Abstract:
The definition and use of multi-valued constant propagation analysis (MVCP), which is an extension of simple constant propagation analysis, is presented in this paper in the context of a user interface reengineering process. A brief description of the adopted COBOL/CICS user interface reengineering model, which makes use of an Abstract User Interface Description Language (AUIDL) to represent user interface structures and behavior, is also given. The experimental context is described and results are shown and discussed. Suggestions for further directions of research and investigation are also presented.
APA, Harvard, Vancouver, ISO, and other styles
12

Crestan, Andrea Wattky, and Gilles Neubert. "Process reengineering in the context of logistics outsourcing." International Journal of Information Technology and Management 8, no. 4 (2009): 344. http://dx.doi.org/10.1504/ijitm.2009.024799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Muraveva-Vitkovskaia, L. A., and R. V. Poltoranin. "Estimation of time characteristics of corporate computer networks functioning." Izvestiâ vysših učebnyh zavedenij. Priborostroenie 61, no. 3 (March 27, 2018): 197–201. http://dx.doi.org/10.17586/0021-3454-2018-61-3-197-201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Lavrov, E. A., A. L. Zolkin, T. G. Aygumov, M. S. Chistyakov, and I. V. Akhmetov. "Analysis of information security issues in corporate computer networks." IOP Conference Series: Materials Science and Engineering 1047, no. 1 (February 1, 2021): 012117. http://dx.doi.org/10.1088/1757-899x/1047/1/012117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Park, J. Y., and S. J. Park. "IBPM: An integrated systems model for business process reengineering." Systems Engineering 1, no. 3 (1998): 159–75. http://dx.doi.org/10.1002/(sici)1520-6858(1998)1:3<159::aid-sys2>3.0.co;2-h.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Hooda, Apeksha, and M. L. Singla. "Process Transformations in E-Governance." International Journal of Electronic Government Research 15, no. 2 (April 2019): 90–107. http://dx.doi.org/10.4018/ijegr.2019040105.

Full text
Abstract:
The purpose of the present study is to assess the maturity level of government process reengineering and investigate the reasons for not achieving much anticipated benefits of E-Governance implementation across developing countries. The present study qualitatively analyzes the reengineering status of government processes in the current E-Governance implementation practices across India using the Process and Enterprise Maturity Model (PEMM). The structured interview was conducted with key people involved in the E-Governance implementation across India. The findings of study indicated that the E-Governance implementation in India is presently missing on the reengineering of government processes, owing to which these processes are not mature enough to deliver the higher performance post E-Governance implementation. The findings of the study suggested that to ensure the performance of government processes, the need is to focus upon the process enablers and enterprise capabilities.
APA, Harvard, Vancouver, ISO, and other styles
17

GESKE, ULRICH, and MICHAEL NITSCHE. "REPRESENTING COBOL IN PROLOG—TOWARDS PROGRAM COMPREHENSION AND REENGINEERING." International Journal of Software Engineering and Knowledge Engineering 06, no. 01 (March 1996): 113–33. http://dx.doi.org/10.1142/s0218194096000065.

Full text
Abstract:
This paper sets out to investigate how COBOL programs can be interpreted using Prolog. For this purpose, we examine how an executable logic specification can be obtained, which is semantically equivalent to the original source. We define a specification language COPRA as a restricted subset of Prolog and show how various imperative constructs, such as GOTOs and subroutine calls, can be handled in this language. The specification is generated automatically and may serve as a starting point for reengineering in form of a higher-level modification of the source program.
APA, Harvard, Vancouver, ISO, and other styles
18

Watanabe, Atsushi, and Yoshitsugu Ohmae. "Topological design of corporate communication networks." Electronics and Communications in Japan (Part I: Communications) 75, no. 3 (1992): 1–11. http://dx.doi.org/10.1002/ecja.4410750301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Caixia Yu, Qingjing Deng, and Guanxiao Yi. "Emergency Procedures Reengineering of Information Process: A Case of Rainstorm Disaster Study." International Journal of Digital Content Technology and its Applications 7, no. 7 (April 15, 2013): 155–64. http://dx.doi.org/10.4156/jdcta.vol7.issue7.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Wang, Shen Tsu, and Meng Hua Li. "Multi-Criteria Decision Analysis Method and Management Information System Reengineering for Solving Vendor-Managed Inventory Bottlenecks in the Notebook Computer Industry." Advanced Materials Research 282-283 (July 2011): 74–77. http://dx.doi.org/10.4028/www.scientific.net/amr.282-283.74.

Full text
Abstract:
Due to increased uncertainties in corporate demands the vendor-managed inventory method was developed; however, relevant literature indicates that the vendor managed inventory system has bottlenecks in implementation. Thus, this study applied the Fuzzy Delphi Analytic Hierarchy Process for selecting objective attributes, and constructed a vendor managed objective hierarchy structure. Using ABC Classification, category A multi-objective attributes was selected. Dynamic multi-criteria decision analysis was used to analyze category A multi-objective attributes, as selected by different sectors in the first year. If all the objectives have quantitative attributes, multi-criteria programming was used to construct the model. Further, comparisons were conducted for the results obtained from the Non-dominated Sorting Genetic Algorithm, the Particle swarm optimization method, and the modified multi-criteria planning method. Modified Data Envelopment Analysis was used for performance evaluation. ARIS (Architecture of Integrated Information System) analyzed relevant corporate process reengineering, and the decision results were incorporated into the management information system.
APA, Harvard, Vancouver, ISO, and other styles
21

Chandra, C., and C. V. Ramamoorthy. "An Evaluation of Knowledge Engineering Approaches to the Maintenance of Evolutionary Software." International Journal of Software Engineering and Knowledge Engineering 08, no. 01 (March 1998): 3–20. http://dx.doi.org/10.1142/s0218194098000030.

Full text
Abstract:
Reverse engineering and reengineering are two major research challenges in the software maintenance process. Reverse engineering is the process of rederiving the specification of a program; and reengineering is the process of modifying an already existing software to add additional functionalities or to correct any malfunction. The difficulty in these tasks are that software development commonly involves many software engineers with implicit assumptions about the behavior of each module. These assumptions are not documented and often leads to inconsistencies in the code. During reverse engineering, such assumptions may not be uncovered. These assumptions usually have complex dependencies, and are the cause of a lot of bugs when the software is reengineered. Many approaches and prototype tools have been developed to address these issues. Reverse engineering and automated program understanding tools have been developed to support the reverse engineering tasks; while various theoretical works on structural program analysis and programs for automated ripple effect analysis have attempted to deal with the reengineering process. These works can be classified into two main types of approaches: those using shallow knowledge or knowledge about the structure of the system and those utilizing deep knowledge or knowledge about the semantics and behavior of the software system. In this paper, we attempt to survey works that have been done under these two broad categories of approaches to deal with the software maintenance tasks, evaluate the strengths and drawbacks of each approach, and attempt to draw a conclusion on the advantages and disadvantages of the two main lines of approaches.
APA, Harvard, Vancouver, ISO, and other styles
22

Clark, Richard. "Business telematics: Corporate networks for the information age." Computer Communications 11, no. 3 (June 1988): 153. http://dx.doi.org/10.1016/0140-3664(88)90063-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

KÖLSCH, ULRIKE, and JÜRGEN LASCHEWSKI. "A FRAMEWORK FOR OBJECT-ORIENTED REVERSE ENGINEERING OF LEGACY INFORMATION SYSTEMS." International Journal of Software Engineering and Knowledge Engineering 09, no. 01 (February 1999): 27–54. http://dx.doi.org/10.1142/s0218194099000048.

Full text
Abstract:
There is every indication that an object-oriented view of an information system is a solid foundation for understanding its legacy organization, for relating it to the environment in which it is embedded and for guiding its reengineering. In this paper we present a framework based upon the formal object-oriented specification language TROLL, which provides an object-oriented view of legacy information systems. The aim is to combine existing methods and keep results in a common and suitable description base which provides the appropriate form for deriving object specifications from the legacy IS. We usethe language TROLL not only as description language, but also as a framework to support the maintenance engineers in their reverse engineering tasks by giving hints about what to do next to complete the object specifications. The result of the approach is a formal object-oriented specification of the legacy IS that is suitable both for developing a new IS or for reengineering the legacy system.
APA, Harvard, Vancouver, ISO, and other styles
24

Sarhan, Zahi A. Abu. "Formalized Model of Stabile Reengineering Information System Functional Elements (Business Processes)." Journal of Computer Science 5, no. 12 (December 1, 2009): 915–21. http://dx.doi.org/10.3844/jcssp.2009.915.921.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Xuejiao, Zhao, and Wang Xuejiao. "Prevention of Nursing Interruption Disputes in Obstetrics and Gynecology Based on Nursing Process Reengineering." Mobile Information Systems 2022 (January 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/2225473.

Full text
Abstract:
During the nursing administration process, including preparation, management, and documentation, there is a high proportion of work interruption that results in nursing administration errors that consequently affect the safety of patients, increase the occurrence of nursing risks, and cause adverse reactions. To investigate the impact of nursing on drug withdrawal disputes in obstetrics and gynecology and reduce medical disputes are of great importance. In this study, documents related to medical disputes are collected and linked to relevant professional information systems for data collection and consultation. The patients are divided into groups and treated with different nursing methods, and then the correlation between nursing methods and disputes in different groups is computed. The results show that, based on the proposed nursing process, medical disputes caused by the cessation of nursing can be effectively reduced. Compared with traditional nursing methods, when the proposed nursing procedures are followed, the dispute rate is reduced by more than 10% and the possibility of serious disputes is also reduced with a reduction rate of about 15%. This shows that, based on the proposed nursing process, reengineering can play an effective preventive role in stopping obstetrics and gynecology nursing disputes.
APA, Harvard, Vancouver, ISO, and other styles
26

Chenthamarakshan, V., K. Dey, J. Hu, A. Mojsilovic, W. Riddle, and V. Sindhwani. "Leveraging social networks for corporate staffing and expert recommendation." IBM Journal of Research and Development 53, no. 6 (November 2009): 11:1–11:10. http://dx.doi.org/10.1147/jrd.2009.5429039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Abdellatif, T., J. Kornas, and J. B. Stefani. "Reengineering J2EE Servers for Automated Management in Distributed Environments." IEEE Distributed Systems Online 8, no. 11 (November 2007): 1. http://dx.doi.org/10.1109/mdso.2007.65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Flett, Peter, Adrienne Curry, and Adam Peat. "Reengineering systems in general practice—A case study review." International Journal of Information Management 28, no. 2 (April 2008): 83–93. http://dx.doi.org/10.1016/j.ijinfomgt.2007.06.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Shimabukuro, Tom M., and Ravi Subbarayan. "Compact private hubs for corporate VSAT networks." Telematics and Informatics 7, no. 2 (January 1990): 123–33. http://dx.doi.org/10.1016/0736-5853(90)90004-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Chan, Conway, and Jim M. Eng. "Global corporate communications with integrated services digital networks." International Journal of Satellite Communications 9, no. 5 (September 1991): 267–76. http://dx.doi.org/10.1002/sat.4600090505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Horton, Maria C., Thomas E. Lewis, and Thomas V. Kinsey. "Reengineering the picture archiving and communication system (PACS) process for digital imaging networks PACS." Journal of Digital Imaging 12, S1 (May 1999): 59–61. http://dx.doi.org/10.1007/bf03168756.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Bieliková, Mária, and Pavol Návrat. "An Experience with the Use of Systems Engineer Case Tool." International Journal of Software Engineering and Knowledge Engineering 07, no. 02 (June 1997): 253–59. http://dx.doi.org/10.1142/s0218194097000151.

Full text
Abstract:
Systems Engineer is a client/server CASE tool for supporting software system development on PC machines under Windows. It compares fairly satisfactorily with other similar tools of the same category. Systems Engineer offers various supporting techniques which address the full software life cycle, from planning and design to code generation, reengineering and maintenance. It supports system engineers working in a team.
APA, Harvard, Vancouver, ISO, and other styles
33

Сергеев, М. Ю., and Т. И. Сергеева. "METHODS OF APPLICATION OF SIMULATION SYSTEMS FOR CORPORATE COMPUTER NETWORKS DESIGNING." СИСТЕМЫ УПРАВЛЕНИЯ И ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ, no. 4(82) (December 1, 2020): 58–63. http://dx.doi.org/10.36622/vstu.2020.83.77.014.

Full text
Abstract:
Описан подход к проектированию корпоративных компьютерных сетей с применением моделирующих систем. Предложена методика проектирования сети, выбора компонентов сети, настройки параметров работы сети, проверки работоспособности сети. Методика проектирования базируется на использовании CASE-средств моделирования сетей. Приведен алгоритм применения моделирующей системы Cisco Packet Tracer для проектирования компьютерной сети. An approach to the design of corporate computer networks using simulation systems is described. A methodology for designing a network, selecting network components, adjusting the parameters of the network, checking the operability of the network is proposed. The design methodology is based on the use of CASE network simulation tools. An algorithm for using the Cisco Packet Tracer simulation system for designing a computer network is presented.
APA, Harvard, Vancouver, ISO, and other styles
34

Zolkin, A. L., E. M. Abdulmukminova, V. N. Malikov, and A. N. Lepshokova. "Problems of personal data and information protection in corporate computer networks." IOP Conference Series: Materials Science and Engineering 1047, no. 1 (February 1, 2021): 012102. http://dx.doi.org/10.1088/1757-899x/1047/1/012102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Ma, Yuefeng, Gang Sheng, and Fengming Ma. "E-commerce Process Reengineering for Customer Privacy Protection." International Journal of Information and Computer Security 15, no. 4 (2021): 1. http://dx.doi.org/10.1504/ijics.2021.10039438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Ma, Fengming, Gang Sheng, and Yuefeng Ma. "E-commerce process reengineering for customer privacy protection." International Journal of Information and Computer Security 15, no. 4 (2021): 373. http://dx.doi.org/10.1504/ijics.2021.116940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Massingill, Berna L., Timothy G. Mattson, and Beverly A. Sanders. "Reengineering for Parallelism: an entry point into PLPP for legacy applications." Concurrency and Computation: Practice and Experience 19, no. 4 (2007): 503–29. http://dx.doi.org/10.1002/cpe.1147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Pătruţ, Bogdan, and Cosmin Tomozei. "Agent Technology in Monitoring Systems." International Journal of Computers Communications & Control 5, no. 5 (December 1, 2010): 852. http://dx.doi.org/10.15837/ijccc.2010.5.2246.

Full text
Abstract:
The aim of this paper is to make a brief presentation of the results obtained by the authors regarding agent technology application in distributed monitoring systems development. Consequently, we would like to present MAgeLan and ContTest as monitoring systems based on intelligent agents technology. Formal aspects regarding intelligent agents will be mentioned. Quantitative issues concerning efficiency, maintenance and reengineering are also to be taken into account.
APA, Harvard, Vancouver, ISO, and other styles
39

WELCH, LONNIE R., GUOHUI YU, BINOY RAVINDRAN, FRANZ KURFESS, JORGE HENRIQUES, MARK WILSON, ANTONIO L. SAMUEL, and MICHAEL W. MASTERS. "REVERSE ENGINEERING OF COMPUTER-BASED CONTROL SYSTEMS." International Journal of Software Engineering and Knowledge Engineering 06, no. 04 (December 1996): 531–47. http://dx.doi.org/10.1142/s0218194096000223.

Full text
Abstract:
This article presents a process for the reengineering of computer-based control systems, and describes tools that automate portions of the process. The intermediate representation (IR) for capturing features of computer-based systems during reverse engineering is presented. A novel feature of the IR is that it incorporates the control system software architecture, a view that enables information to be captured at five levels of granularity: the program level, the task level, the package level, the subprogram level, and the statement level. A reverse engineering toolset that constructs the IR from Ada programs, displays the IR, and computes concurrency, communication and object-orientedness metrics is presented. Also described is the design of hypermedia techniques that enhance the usability of the reverse engineering tools.
APA, Harvard, Vancouver, ISO, and other styles
40

Klaas-Wissing, Thorsten, and Sascha Albers. "Cooperative versus corporate governance of LTL networks." International Journal of Logistics Research and Applications 13, no. 6 (November 25, 2010): 493–506. http://dx.doi.org/10.1080/13675561003776828.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Mohanty, R. P., and S. G. Deshmukh. "Business process reengineering : value innovation in industrial engineering practices." International Journal of Computer Applications in Technology 14, no. 4/5/6 (2001): 119. http://dx.doi.org/10.1504/ijcat.2001.000267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Zhang, Shizhuo. "Application of Computer-Aided Graphic Design in Enterprise Image." Security and Communication Networks 2022 (January 24, 2022): 1–7. http://dx.doi.org/10.1155/2022/6206434.

Full text
Abstract:
In order to study the role of computer-aided graphic design on corporate image, improve the internal management efficiency and market management effect of enterprises, and improve the business process of corporate image design (visual identity, VI), according to the relationship between corporate image design investment and internal management, this paper studies and analyzes the factors that affect corporate market management, including employee exchange rate, unit labor value, market share, team ratio, and passive order rate. Finally, it was found that the amount of investment in VI related work was confidently and negatively correlated with the employee exchange rate.
APA, Harvard, Vancouver, ISO, and other styles
43

Reardon, Ray. "Essentials of successful corporate electronic mail." Computer Communications 12, no. 6 (December 1989): 359–64. http://dx.doi.org/10.1016/0140-3664(89)90006-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Wetterau, James. "CTI in the corporate enterprise." International Journal of Network Management 8, no. 4 (July 1998): 235–43. http://dx.doi.org/10.1002/(sici)1099-1190(199807/08)8:4<235::aid-nem307>3.0.co;2-f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Mani, Dalhia, and David Knoke. "On intersecting ground: the changing structure of US corporate networks." Social Network Analysis and Mining 1, no. 1 (October 6, 2010): 43–58. http://dx.doi.org/10.1007/s13278-010-0013-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Chen, Jin, Dan He, and Liang Tong. "Innovation business process reengineering based on workflow technology: a type of e-innovation." International Journal of Information Technology and Management 3, no. 1 (2004): 20. http://dx.doi.org/10.1504/ijitm.2004.004783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Ohmae, Yoshitsugu, Atsushi Watanabe, and Miyuki Takeshita. "Dividing method for topological design of corporate communication networks." Electronics and Communications in Japan (Part I: Communications) 75, no. 8 (1992): 54–63. http://dx.doi.org/10.1002/ecja.4410750805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Chernova, E. V., P. N. Polezhaev, A. E. Shukhman, Yu A. Ushakov, I. P. Bolodurina, and N. F. Bakhareva. "Security event data collection and analysis in large corporate networks." Information Technology and Nanotechnology, no. 2416 (2019): 233–41. http://dx.doi.org/10.18287/1613-0073-2019-2416-233-241.

Full text
Abstract:
Every year computer networks become more complex, which directly affects the provision of a high level of information security. Different commercial services, critical systems, and information resources prevailing in such networks are profitable targets for terrorists, cyber-spies, and criminals. The consequences range from the theft of strategic, highly valued intellectual property and direct financial losses to significant damages to a brand and customer trust. Attackers have the advantage in complex computer networks – it is easier to hide their tracks. The detection and identification of security incidents are the most important and difficult tasks. It is required to detect security incidents as soon as possible, to analyze and respond to them correctly, so as not to complicate the work of the enterprise computer network. The difficulty is that different event sources offer different data formats or can duplicate events. In addition, some events do not indicate any problems on their own, but their sequence may indicate the presence of a security incident. All collection processes of security events must be performed in real-time, which means streaming data processing.
APA, Harvard, Vancouver, ISO, and other styles
49

Mayor, Vicente, Rafael Estepa, Antonio Estepa, and Germán Madinabeitia. "Unified call admission control in corporate domains." Computer Communications 150 (January 2020): 589–602. http://dx.doi.org/10.1016/j.comcom.2019.11.041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Li, Jing. "An Early Control Algorithm of Corporate Financial Risk Using Artificial Neural Networks." Mobile Information Systems 2022 (May 2, 2022): 1–12. http://dx.doi.org/10.1155/2022/4398602.

Full text
Abstract:
Based on DL theory, this paper discusses and studies the early warning of enterprise financial risks in detail. And put forward a new enterprise financial risk early-warning model. The purpose is to enable enterprises to better analyze the changing trend of financial data, make correct decisions by managers and investors of enterprises, and promote the stable development of national economy and enterprises. This model is based on the early-warning theory of enterprises, based on the financial statements, business plans, and other relevant accounting information of enterprises, using accounting, finance, and marketing theories, adopting the methods of ratio analysis, comparative analysis, factor analysis, etc., to warn the financial risks of enterprises. This paper uses a lot of data to train the parameters of the DL financial early-warning model and then verifies the established financial early-warning model. In order to verify the reliability of this model, this model is compared with other two financial early-warning models. The results show that the prediction accuracy of this model is as high as 94%, which is 8~15% higher than that of other models. In this paper, the DL method has been applied to financial risk early warning and achieved good results. It has certain theoretical and practical significance in the field of enterprise financial early warning.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography