Статті в журналах з теми "Reengineering of corporate computer networks"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Reengineering of corporate computer networks.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Reengineering of corporate computer networks".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Butler, Charles W., Earl D. Hodil, and Gary L. Richardson. "Software reengineering." Data Processing 28, no. 6 (July 1986): 303–7. http://dx.doi.org/10.1016/0011-684x(86)90231-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

BERZTISS, ALFS T. "REVERSE ENGINEERING, REENGINEERING, AND CONCURRENT ENGINEERING OF SOFTWARE." International Journal of Software Engineering and Knowledge Engineering 05, no. 02 (June 1995): 299–324. http://dx.doi.org/10.1142/s0218194095000150.

Повний текст джерела
Анотація:
This survey reviews four classes of reengineering of software systems: code restructuring and translation of code into a new language, design recovery for corrective maintenance, design recovery for software enhancement, and software reengineering as part of radical business process reengineering. Special attention is given to the reengineering of data bases and user interfaces. We also consider concurrent software engineering, its place in the software reengineering process, and groupware in support of this process.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Hoekstra, Rinke. "The knowledge reengineering bottleneck." Semantic Web 1, no. 1,2 (2010): 111–15. http://dx.doi.org/10.3233/sw-2010-0004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Solomon, Esther. "The dynamics of corporate change: management's evaluation of stakeholder characteristics." Human Systems Management 20, no. 3 (September 3, 2001): 257–65. http://dx.doi.org/10.3233/hsm-2001-20308.

Повний текст джерела
Анотація:
In an era of globalization, rapid technological changes and intense competition, new forms of organizational designs and networks have replaced traditional forms of organizations. Interconnections among businesses and their various stakeholders including suppliers, customers providers, employees and others are now more rapid and complex as they are facilitated by advanced information technology and systems. This research addresses these changes by examining managers' perceptions of the stakeholders that were viewed as responsible for initiating change and innovation in their respective organizations. This paper presents the results of an empirical research project of 218 managers from major companies. Particular focus is placed on identifying which specific groups were critical stakeholders for the changes, and assessing their legitimacy, power and authority in relation to specific change initiatives and outcomes. Implications of the findings are discussed regarding process changes and reengineering within organizations and business networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Richardson, Ted. "Future for corporate networks." Data Processing 27, no. 6 (July 1985): 37–40. http://dx.doi.org/10.1016/0011-684x(85)90271-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Beskorovainyi, Vladimir V., Lubomyr B. Petryshyn, and Vasyl О. Honcharenko. "Mathematical models of a multi-criteria problem of reengineering topological structures of ecological monitoring networks." Applied Aspects of Information Technology 5, no. 1 (April 17, 2022): 11–24. http://dx.doi.org/10.15276/aait.05.2022.1.

Повний текст джерела
Анотація:
The article deals with the theoretical aspects of the problem of reengineering the topological structures of terrestrial ecological monitoring networks. As a result of the analysis of the current state of the problem, it was revealed the need to change the network of monitoring points, to increase requirements for the efficiency and accuracy of observations, as well as to do the more advanced technologies for collecting, processing, storing and transmitting information. All this is possible due to reengineering of existing monitoring networks. This requires the improvement of network system optimization technologies and their software in terms of taking into account the features of the reengineering problem, as well as the mathematical models and methods used for this. To solve the problem of reengineering of terrestrial monitoring networks, an aggregative-decomposition approach is proposed. The approach is divided into a set of tasks considering their interconnections in terms of input and output data. This made it possible to define a set of tasks that form the basis of reengineering procedures. To increase the efficiency of technologies for computer-aided design and reengineering of networks, a set of mathematical models is proposed that covers the main stages of their life cycles. The article discusses: a systemological model of iterative technology for obtaining design solutions; analytical models for evaluating the properties of network reengineering options in terms of efficiency, reliability, survivability and costs; models for identifying effective options for network reengineering based on Karlin and Germeier theorems; a model for evaluating the local properties of options in the form of a utility function of local criteria; model of scalar multicriteria estimation of network reengineering options based on utility theory. The utility function makes it possible to implement both linear and non-linear (including Z- and S-shaped) dependencies on their values. For the practical implementation of models of multicriteria problems of reengineering of topological structures of networks, it is proposed to use the method of generation of effective design solutions in parallel with the generation and the method of comparator parametric synthesis of the scalar multicriteria estimation function. The performance and efficiency of the proposed mathematical models and methods are demonstrated by examples of solving the problems of subset selection of Paretooptimal options for building networks and parametric synthesis of the scalar multicriteria estimation function. The application in practice of the proposed set of models and methods will increase the degree of automation of network reengineering processes, reduce the time for solving the problem of multi-criteria choice due to the reduction in the time complexity of the analysis procedures, and increase the stability of the decisions made by compromising their choice only from a subset of effective ones.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Best, Eike, and Raymond Devillers. "Synthesis and reengineering of persistent systems." Acta Informatica 52, no. 1 (November 29, 2014): 35–60. http://dx.doi.org/10.1007/s00236-014-0209-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

CANFORA, GERARDO, ANDREA DE LUCIA, and GIUSEPPE A. DI LUCCA. "AN INCREMENTAL OBJECT-ORIENTED MIGRATION STRATEGY FOR RPG LEGACY SYSTEMS." International Journal of Software Engineering and Knowledge Engineering 09, no. 01 (February 1999): 5–25. http://dx.doi.org/10.1142/s0218194099000036.

Повний текст джерела
Анотація:
We present a strategy for incrementally migrating legacy systems to object-oriented platforms. The migration process consists of six sequential phases and encompasses reverse engineering and reengineering activities. The aim of reverse engineering is to decompose programs into components implementing the user interface and components implementing application domain objects. The identification of objects is centred around persistent data stores and exploits object-oriented design metrics. Wrapping is the core of the reengineering activities. It makes new systems able to exploit existing resources, thus allowing an incremental and selective replacement of the identified objects. The migration strategy has been defined and experimented within the project ERCOLE (Encapsulation, Reengineering and Coexistence of Object with Legacy) on legacy systems developed in RPG for the IBM AS/400 environment.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Newman, P. "ATM technology for corporate networks." IEEE Communications Magazine 30, no. 4 (April 1992): 90–101. http://dx.doi.org/10.1109/35.135793.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Barua, Anitesh, C. H. Sophie Lee, and Andrew B. Whinston. "The Calculus of Reengineering." Information Systems Research 7, no. 4 (December 1996): 409–28. http://dx.doi.org/10.1287/isre.7.4.409.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

MERLO, ETTORE, JEAN-FRANCOIS GIRARD, LAURIE HENDREN, and R. DE MORI. "MULTI-VALUED CONSTANT PROPAGATION ANALYSIS FOR USER INTERFACE REENGINEERING." International Journal of Software Engineering and Knowledge Engineering 05, no. 01 (March 1995): 5–23. http://dx.doi.org/10.1142/s0218194095000022.

Повний текст джерела
Анотація:
The definition and use of multi-valued constant propagation analysis (MVCP), which is an extension of simple constant propagation analysis, is presented in this paper in the context of a user interface reengineering process. A brief description of the adopted COBOL/CICS user interface reengineering model, which makes use of an Abstract User Interface Description Language (AUIDL) to represent user interface structures and behavior, is also given. The experimental context is described and results are shown and discussed. Suggestions for further directions of research and investigation are also presented.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Crestan, Andrea Wattky, and Gilles Neubert. "Process reengineering in the context of logistics outsourcing." International Journal of Information Technology and Management 8, no. 4 (2009): 344. http://dx.doi.org/10.1504/ijitm.2009.024799.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Muraveva-Vitkovskaia, L. A., and R. V. Poltoranin. "Estimation of time characteristics of corporate computer networks functioning." Izvestiâ vysših učebnyh zavedenij. Priborostroenie 61, no. 3 (March 27, 2018): 197–201. http://dx.doi.org/10.17586/0021-3454-2018-61-3-197-201.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Lavrov, E. A., A. L. Zolkin, T. G. Aygumov, M. S. Chistyakov, and I. V. Akhmetov. "Analysis of information security issues in corporate computer networks." IOP Conference Series: Materials Science and Engineering 1047, no. 1 (February 1, 2021): 012117. http://dx.doi.org/10.1088/1757-899x/1047/1/012117.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Park, J. Y., and S. J. Park. "IBPM: An integrated systems model for business process reengineering." Systems Engineering 1, no. 3 (1998): 159–75. http://dx.doi.org/10.1002/(sici)1520-6858(1998)1:3<159::aid-sys2>3.0.co;2-h.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Hooda, Apeksha, and M. L. Singla. "Process Transformations in E-Governance." International Journal of Electronic Government Research 15, no. 2 (April 2019): 90–107. http://dx.doi.org/10.4018/ijegr.2019040105.

Повний текст джерела
Анотація:
The purpose of the present study is to assess the maturity level of government process reengineering and investigate the reasons for not achieving much anticipated benefits of E-Governance implementation across developing countries. The present study qualitatively analyzes the reengineering status of government processes in the current E-Governance implementation practices across India using the Process and Enterprise Maturity Model (PEMM). The structured interview was conducted with key people involved in the E-Governance implementation across India. The findings of study indicated that the E-Governance implementation in India is presently missing on the reengineering of government processes, owing to which these processes are not mature enough to deliver the higher performance post E-Governance implementation. The findings of the study suggested that to ensure the performance of government processes, the need is to focus upon the process enablers and enterprise capabilities.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

GESKE, ULRICH, and MICHAEL NITSCHE. "REPRESENTING COBOL IN PROLOG—TOWARDS PROGRAM COMPREHENSION AND REENGINEERING." International Journal of Software Engineering and Knowledge Engineering 06, no. 01 (March 1996): 113–33. http://dx.doi.org/10.1142/s0218194096000065.

Повний текст джерела
Анотація:
This paper sets out to investigate how COBOL programs can be interpreted using Prolog. For this purpose, we examine how an executable logic specification can be obtained, which is semantically equivalent to the original source. We define a specification language COPRA as a restricted subset of Prolog and show how various imperative constructs, such as GOTOs and subroutine calls, can be handled in this language. The specification is generated automatically and may serve as a starting point for reengineering in form of a higher-level modification of the source program.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Watanabe, Atsushi, and Yoshitsugu Ohmae. "Topological design of corporate communication networks." Electronics and Communications in Japan (Part I: Communications) 75, no. 3 (1992): 1–11. http://dx.doi.org/10.1002/ecja.4410750301.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Caixia Yu, Qingjing Deng, and Guanxiao Yi. "Emergency Procedures Reengineering of Information Process: A Case of Rainstorm Disaster Study." International Journal of Digital Content Technology and its Applications 7, no. 7 (April 15, 2013): 155–64. http://dx.doi.org/10.4156/jdcta.vol7.issue7.18.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Wang, Shen Tsu, and Meng Hua Li. "Multi-Criteria Decision Analysis Method and Management Information System Reengineering for Solving Vendor-Managed Inventory Bottlenecks in the Notebook Computer Industry." Advanced Materials Research 282-283 (July 2011): 74–77. http://dx.doi.org/10.4028/www.scientific.net/amr.282-283.74.

Повний текст джерела
Анотація:
Due to increased uncertainties in corporate demands the vendor-managed inventory method was developed; however, relevant literature indicates that the vendor managed inventory system has bottlenecks in implementation. Thus, this study applied the Fuzzy Delphi Analytic Hierarchy Process for selecting objective attributes, and constructed a vendor managed objective hierarchy structure. Using ABC Classification, category A multi-objective attributes was selected. Dynamic multi-criteria decision analysis was used to analyze category A multi-objective attributes, as selected by different sectors in the first year. If all the objectives have quantitative attributes, multi-criteria programming was used to construct the model. Further, comparisons were conducted for the results obtained from the Non-dominated Sorting Genetic Algorithm, the Particle swarm optimization method, and the modified multi-criteria planning method. Modified Data Envelopment Analysis was used for performance evaluation. ARIS (Architecture of Integrated Information System) analyzed relevant corporate process reengineering, and the decision results were incorporated into the management information system.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Chandra, C., and C. V. Ramamoorthy. "An Evaluation of Knowledge Engineering Approaches to the Maintenance of Evolutionary Software." International Journal of Software Engineering and Knowledge Engineering 08, no. 01 (March 1998): 3–20. http://dx.doi.org/10.1142/s0218194098000030.

Повний текст джерела
Анотація:
Reverse engineering and reengineering are two major research challenges in the software maintenance process. Reverse engineering is the process of rederiving the specification of a program; and reengineering is the process of modifying an already existing software to add additional functionalities or to correct any malfunction. The difficulty in these tasks are that software development commonly involves many software engineers with implicit assumptions about the behavior of each module. These assumptions are not documented and often leads to inconsistencies in the code. During reverse engineering, such assumptions may not be uncovered. These assumptions usually have complex dependencies, and are the cause of a lot of bugs when the software is reengineered. Many approaches and prototype tools have been developed to address these issues. Reverse engineering and automated program understanding tools have been developed to support the reverse engineering tasks; while various theoretical works on structural program analysis and programs for automated ripple effect analysis have attempted to deal with the reengineering process. These works can be classified into two main types of approaches: those using shallow knowledge or knowledge about the structure of the system and those utilizing deep knowledge or knowledge about the semantics and behavior of the software system. In this paper, we attempt to survey works that have been done under these two broad categories of approaches to deal with the software maintenance tasks, evaluate the strengths and drawbacks of each approach, and attempt to draw a conclusion on the advantages and disadvantages of the two main lines of approaches.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Clark, Richard. "Business telematics: Corporate networks for the information age." Computer Communications 11, no. 3 (June 1988): 153. http://dx.doi.org/10.1016/0140-3664(88)90063-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

KÖLSCH, ULRIKE, and JÜRGEN LASCHEWSKI. "A FRAMEWORK FOR OBJECT-ORIENTED REVERSE ENGINEERING OF LEGACY INFORMATION SYSTEMS." International Journal of Software Engineering and Knowledge Engineering 09, no. 01 (February 1999): 27–54. http://dx.doi.org/10.1142/s0218194099000048.

Повний текст джерела
Анотація:
There is every indication that an object-oriented view of an information system is a solid foundation for understanding its legacy organization, for relating it to the environment in which it is embedded and for guiding its reengineering. In this paper we present a framework based upon the formal object-oriented specification language TROLL, which provides an object-oriented view of legacy information systems. The aim is to combine existing methods and keep results in a common and suitable description base which provides the appropriate form for deriving object specifications from the legacy IS. We usethe language TROLL not only as description language, but also as a framework to support the maintenance engineers in their reverse engineering tasks by giving hints about what to do next to complete the object specifications. The result of the approach is a formal object-oriented specification of the legacy IS that is suitable both for developing a new IS or for reengineering the legacy system.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Sarhan, Zahi A. Abu. "Formalized Model of Stabile Reengineering Information System Functional Elements (Business Processes)." Journal of Computer Science 5, no. 12 (December 1, 2009): 915–21. http://dx.doi.org/10.3844/jcssp.2009.915.921.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Xuejiao, Zhao, and Wang Xuejiao. "Prevention of Nursing Interruption Disputes in Obstetrics and Gynecology Based on Nursing Process Reengineering." Mobile Information Systems 2022 (January 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/2225473.

Повний текст джерела
Анотація:
During the nursing administration process, including preparation, management, and documentation, there is a high proportion of work interruption that results in nursing administration errors that consequently affect the safety of patients, increase the occurrence of nursing risks, and cause adverse reactions. To investigate the impact of nursing on drug withdrawal disputes in obstetrics and gynecology and reduce medical disputes are of great importance. In this study, documents related to medical disputes are collected and linked to relevant professional information systems for data collection and consultation. The patients are divided into groups and treated with different nursing methods, and then the correlation between nursing methods and disputes in different groups is computed. The results show that, based on the proposed nursing process, medical disputes caused by the cessation of nursing can be effectively reduced. Compared with traditional nursing methods, when the proposed nursing procedures are followed, the dispute rate is reduced by more than 10% and the possibility of serious disputes is also reduced with a reduction rate of about 15%. This shows that, based on the proposed nursing process, reengineering can play an effective preventive role in stopping obstetrics and gynecology nursing disputes.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Chenthamarakshan, V., K. Dey, J. Hu, A. Mojsilovic, W. Riddle, and V. Sindhwani. "Leveraging social networks for corporate staffing and expert recommendation." IBM Journal of Research and Development 53, no. 6 (November 2009): 11:1–11:10. http://dx.doi.org/10.1147/jrd.2009.5429039.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Abdellatif, T., J. Kornas, and J. B. Stefani. "Reengineering J2EE Servers for Automated Management in Distributed Environments." IEEE Distributed Systems Online 8, no. 11 (November 2007): 1. http://dx.doi.org/10.1109/mdso.2007.65.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Flett, Peter, Adrienne Curry, and Adam Peat. "Reengineering systems in general practice—A case study review." International Journal of Information Management 28, no. 2 (April 2008): 83–93. http://dx.doi.org/10.1016/j.ijinfomgt.2007.06.001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Shimabukuro, Tom M., and Ravi Subbarayan. "Compact private hubs for corporate VSAT networks." Telematics and Informatics 7, no. 2 (January 1990): 123–33. http://dx.doi.org/10.1016/0736-5853(90)90004-c.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Chan, Conway, and Jim M. Eng. "Global corporate communications with integrated services digital networks." International Journal of Satellite Communications 9, no. 5 (September 1991): 267–76. http://dx.doi.org/10.1002/sat.4600090505.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Horton, Maria C., Thomas E. Lewis, and Thomas V. Kinsey. "Reengineering the picture archiving and communication system (PACS) process for digital imaging networks PACS." Journal of Digital Imaging 12, S1 (May 1999): 59–61. http://dx.doi.org/10.1007/bf03168756.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Bieliková, Mária, and Pavol Návrat. "An Experience with the Use of Systems Engineer Case Tool." International Journal of Software Engineering and Knowledge Engineering 07, no. 02 (June 1997): 253–59. http://dx.doi.org/10.1142/s0218194097000151.

Повний текст джерела
Анотація:
Systems Engineer is a client/server CASE tool for supporting software system development on PC machines under Windows. It compares fairly satisfactorily with other similar tools of the same category. Systems Engineer offers various supporting techniques which address the full software life cycle, from planning and design to code generation, reengineering and maintenance. It supports system engineers working in a team.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Сергеев, М. Ю., and Т. И. Сергеева. "METHODS OF APPLICATION OF SIMULATION SYSTEMS FOR CORPORATE COMPUTER NETWORKS DESIGNING." СИСТЕМЫ УПРАВЛЕНИЯ И ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ, no. 4(82) (December 1, 2020): 58–63. http://dx.doi.org/10.36622/vstu.2020.83.77.014.

Повний текст джерела
Анотація:
Описан подход к проектированию корпоративных компьютерных сетей с применением моделирующих систем. Предложена методика проектирования сети, выбора компонентов сети, настройки параметров работы сети, проверки работоспособности сети. Методика проектирования базируется на использовании CASE-средств моделирования сетей. Приведен алгоритм применения моделирующей системы Cisco Packet Tracer для проектирования компьютерной сети. An approach to the design of corporate computer networks using simulation systems is described. A methodology for designing a network, selecting network components, adjusting the parameters of the network, checking the operability of the network is proposed. The design methodology is based on the use of CASE network simulation tools. An algorithm for using the Cisco Packet Tracer simulation system for designing a computer network is presented.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Zolkin, A. L., E. M. Abdulmukminova, V. N. Malikov, and A. N. Lepshokova. "Problems of personal data and information protection in corporate computer networks." IOP Conference Series: Materials Science and Engineering 1047, no. 1 (February 1, 2021): 012102. http://dx.doi.org/10.1088/1757-899x/1047/1/012102.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Ma, Yuefeng, Gang Sheng, and Fengming Ma. "E-commerce Process Reengineering for Customer Privacy Protection." International Journal of Information and Computer Security 15, no. 4 (2021): 1. http://dx.doi.org/10.1504/ijics.2021.10039438.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Ma, Fengming, Gang Sheng, and Yuefeng Ma. "E-commerce process reengineering for customer privacy protection." International Journal of Information and Computer Security 15, no. 4 (2021): 373. http://dx.doi.org/10.1504/ijics.2021.116940.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Massingill, Berna L., Timothy G. Mattson, and Beverly A. Sanders. "Reengineering for Parallelism: an entry point into PLPP for legacy applications." Concurrency and Computation: Practice and Experience 19, no. 4 (2007): 503–29. http://dx.doi.org/10.1002/cpe.1147.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Pătruţ, Bogdan, and Cosmin Tomozei. "Agent Technology in Monitoring Systems." International Journal of Computers Communications & Control 5, no. 5 (December 1, 2010): 852. http://dx.doi.org/10.15837/ijccc.2010.5.2246.

Повний текст джерела
Анотація:
The aim of this paper is to make a brief presentation of the results obtained by the authors regarding agent technology application in distributed monitoring systems development. Consequently, we would like to present MAgeLan and ContTest as monitoring systems based on intelligent agents technology. Formal aspects regarding intelligent agents will be mentioned. Quantitative issues concerning efficiency, maintenance and reengineering are also to be taken into account.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

WELCH, LONNIE R., GUOHUI YU, BINOY RAVINDRAN, FRANZ KURFESS, JORGE HENRIQUES, MARK WILSON, ANTONIO L. SAMUEL, and MICHAEL W. MASTERS. "REVERSE ENGINEERING OF COMPUTER-BASED CONTROL SYSTEMS." International Journal of Software Engineering and Knowledge Engineering 06, no. 04 (December 1996): 531–47. http://dx.doi.org/10.1142/s0218194096000223.

Повний текст джерела
Анотація:
This article presents a process for the reengineering of computer-based control systems, and describes tools that automate portions of the process. The intermediate representation (IR) for capturing features of computer-based systems during reverse engineering is presented. A novel feature of the IR is that it incorporates the control system software architecture, a view that enables information to be captured at five levels of granularity: the program level, the task level, the package level, the subprogram level, and the statement level. A reverse engineering toolset that constructs the IR from Ada programs, displays the IR, and computes concurrency, communication and object-orientedness metrics is presented. Also described is the design of hypermedia techniques that enhance the usability of the reverse engineering tools.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Klaas-Wissing, Thorsten, and Sascha Albers. "Cooperative versus corporate governance of LTL networks." International Journal of Logistics Research and Applications 13, no. 6 (November 25, 2010): 493–506. http://dx.doi.org/10.1080/13675561003776828.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Mohanty, R. P., and S. G. Deshmukh. "Business process reengineering : value innovation in industrial engineering practices." International Journal of Computer Applications in Technology 14, no. 4/5/6 (2001): 119. http://dx.doi.org/10.1504/ijcat.2001.000267.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Zhang, Shizhuo. "Application of Computer-Aided Graphic Design in Enterprise Image." Security and Communication Networks 2022 (January 24, 2022): 1–7. http://dx.doi.org/10.1155/2022/6206434.

Повний текст джерела
Анотація:
In order to study the role of computer-aided graphic design on corporate image, improve the internal management efficiency and market management effect of enterprises, and improve the business process of corporate image design (visual identity, VI), according to the relationship between corporate image design investment and internal management, this paper studies and analyzes the factors that affect corporate market management, including employee exchange rate, unit labor value, market share, team ratio, and passive order rate. Finally, it was found that the amount of investment in VI related work was confidently and negatively correlated with the employee exchange rate.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Reardon, Ray. "Essentials of successful corporate electronic mail." Computer Communications 12, no. 6 (December 1989): 359–64. http://dx.doi.org/10.1016/0140-3664(89)90006-6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Wetterau, James. "CTI in the corporate enterprise." International Journal of Network Management 8, no. 4 (July 1998): 235–43. http://dx.doi.org/10.1002/(sici)1099-1190(199807/08)8:4<235::aid-nem307>3.0.co;2-f.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Mani, Dalhia, and David Knoke. "On intersecting ground: the changing structure of US corporate networks." Social Network Analysis and Mining 1, no. 1 (October 6, 2010): 43–58. http://dx.doi.org/10.1007/s13278-010-0013-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Chen, Jin, Dan He, and Liang Tong. "Innovation business process reengineering based on workflow technology: a type of e-innovation." International Journal of Information Technology and Management 3, no. 1 (2004): 20. http://dx.doi.org/10.1504/ijitm.2004.004783.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Ohmae, Yoshitsugu, Atsushi Watanabe, and Miyuki Takeshita. "Dividing method for topological design of corporate communication networks." Electronics and Communications in Japan (Part I: Communications) 75, no. 8 (1992): 54–63. http://dx.doi.org/10.1002/ecja.4410750805.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Chernova, E. V., P. N. Polezhaev, A. E. Shukhman, Yu A. Ushakov, I. P. Bolodurina, and N. F. Bakhareva. "Security event data collection and analysis in large corporate networks." Information Technology and Nanotechnology, no. 2416 (2019): 233–41. http://dx.doi.org/10.18287/1613-0073-2019-2416-233-241.

Повний текст джерела
Анотація:
Every year computer networks become more complex, which directly affects the provision of a high level of information security. Different commercial services, critical systems, and information resources prevailing in such networks are profitable targets for terrorists, cyber-spies, and criminals. The consequences range from the theft of strategic, highly valued intellectual property and direct financial losses to significant damages to a brand and customer trust. Attackers have the advantage in complex computer networks – it is easier to hide their tracks. The detection and identification of security incidents are the most important and difficult tasks. It is required to detect security incidents as soon as possible, to analyze and respond to them correctly, so as not to complicate the work of the enterprise computer network. The difficulty is that different event sources offer different data formats or can duplicate events. In addition, some events do not indicate any problems on their own, but their sequence may indicate the presence of a security incident. All collection processes of security events must be performed in real-time, which means streaming data processing.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Mayor, Vicente, Rafael Estepa, Antonio Estepa, and Germán Madinabeitia. "Unified call admission control in corporate domains." Computer Communications 150 (January 2020): 589–602. http://dx.doi.org/10.1016/j.comcom.2019.11.041.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Li, Jing. "An Early Control Algorithm of Corporate Financial Risk Using Artificial Neural Networks." Mobile Information Systems 2022 (May 2, 2022): 1–12. http://dx.doi.org/10.1155/2022/4398602.

Повний текст джерела
Анотація:
Based on DL theory, this paper discusses and studies the early warning of enterprise financial risks in detail. And put forward a new enterprise financial risk early-warning model. The purpose is to enable enterprises to better analyze the changing trend of financial data, make correct decisions by managers and investors of enterprises, and promote the stable development of national economy and enterprises. This model is based on the early-warning theory of enterprises, based on the financial statements, business plans, and other relevant accounting information of enterprises, using accounting, finance, and marketing theories, adopting the methods of ratio analysis, comparative analysis, factor analysis, etc., to warn the financial risks of enterprises. This paper uses a lot of data to train the parameters of the DL financial early-warning model and then verifies the established financial early-warning model. In order to verify the reliability of this model, this model is compared with other two financial early-warning models. The results show that the prediction accuracy of this model is as high as 94%, which is 8~15% higher than that of other models. In this paper, the DL method has been applied to financial risk early warning and achieved good results. It has certain theoretical and practical significance in the field of enterprise financial early warning.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії