Muutke küpsiste eelistusi

E-raamat: E-Technologies: 6th International Conference, MCETECH 2015, Montreal, QC, Canada, May 12-15, 2015, Proceedings

Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the 6th International Conference on E-Technologies, MCETECH 2015, held in Montréal, Canada, in May 2015.The 18 papers presented in this volume were carefully reviewed and selected from 42 submissions. They have been organized in topical sections on process adaptation; legal issues; social computing; eHealth; and eBusiness, eEducation and eLogistics.

Process Adaptation.- Ontology-Driven Process Specialization.- Towards Automating Business Process Compensation Scoping Logic.- Specification and Detection of Business Process Anti patterns.- Coping with Uncertainty in Schema Matching: Bayesian Networks and Agent-based Modeling Approach.- Legal Issues.- Geo location Hazards in Geo social Networks.- Information Technology Artifacts in the Regulatory Compliance of Business Processes: A Meta-Analysis.- Information Flow-Based Security Levels Assessment for Access Control Systems.- Social Computing.- Understanding Consumer Participation on Companies" Brand Microblogs.- Recommender Engines Under the Influence of Popularity.- Halo Effect on the Adoption of Mobile Payment: A Schema Theory Perspective.- A Trust Certificate Model for Multi-Agent Systems.- eHealth.- Efficient Privacy-Preserving Identity Scheme for Electronic Validation of Phase 1 Clinical Trials.- Testing Policy-Based e-Health Monitoring Processes Using TTCN-3.- PHEN: Parkins

on Helper Emergency Notification System Using Bayesian Belief Network.- Examining the Effects of Perceived Enjoyment and Habit on Smartphone Addiction: The Role of User Type.- eBusiness, eEducation and eLogistics.- Teaching Enterprise Modeling Based on Multi-Media Simulation: A Pragmatic Approach.- Assessing the Potential of RFID Technologies on the Productivity of a Freight Forwarder.- Towards Quality-Driven SOA Systems Refactoring Through Planning.

Michael Weiss - nach dem Studium Maschinenbau-Wirtschaftsingenieurwesen tätig in verschiedenen Führungspositionen in der Automobil- und Investitionsgüterindustrie sowie in Dienstleistungsunternehmen und immer mit der Herausforderung konfrontiert, Menschen mit ihren Bedürfnissen zu führen. Heute tätig als Unternehmensberater, Trainer und persönlicher Coach.
Process Adaptation
Ontology-Driven Process Specialization
3(17)
Abderrahmane Leshob
Hafedh Mili
Anis Boubaker
Towards Automating Business Process Compensation Scoping Logic
20(17)
Anis Boubaker
Hafedh Mili
Abderrahmane Leshob
Yasmine Charif
Specification and Detection of Business Process Antipatterns
37(16)
Francis Palma
Naouel Moha
Yann-Gael Gueheneuc
Coping with Uncertainty in Schema Matching: Bayesian Networks and Agent-based Modeling Approach
53(18)
Hicham Assoudi
Hakim Lounis
Legal Issues
Geolocation Hazards in Geosocial Networks
71(18)
Zakaria Sahnoune
Cheu Yien Yep
Esma Aimeur
Information Technology Artifacts in the Regulatory Compliance of Business Processes: A Meta-Analysis
89(16)
Okhaide Akhigbe
Daniel Amyot
Gregory Richards
Information Flow-Based Security Levels Assessment for Access Control Systems
105(20)
Sofiene Boulares
Kamel Adi
Luigi Logrippo
Social Computing Understanding Consumer Participation on Companies' Brand Microblogs
125(13)
Kem Z.K. Zhang
Morad Benyoucef
Sesia J. Zhao
Recommender Engines Under the Influence of Popularity
138(15)
Guillaume Blot
Pierre Saurel
Francis Rousseaux
Halo Effect on the Adoption of Mobile Payment: A Schema Theory Perspective
153(13)
Xiang Gong
Kem Z.K. Zhang
Sesia J. Zhao
A Trust Certificate Model for Multi-Agent Systems
166(17)
Basmah Almoaber
Thomas Tran
eHealth
Efficient Privacy-Preserving Identity Scheme for Electronic Validation of Phase 1 Clinical Trials
183(14)
Hanna Farah
Daniel Amyot
Khaled El Emam
Testing Policy-Based e-Health Monitoring Processes Using TTCN-3
197(15)
Bernard Stepien
Benjamin Eze
Liam Peyton
PHEN: Parkinson Helper Emergency Notification System Using Bayesian Belief Network
212(12)
Hamid Mcheick
Malak Khreiss
Hala Sweidan
Iyad Zaarour
Examining the Effects of Perceived Enjoyment and Habit on Smartphone Addiction: The Role of User Type
224(15)
Chongyang Chen
Kem Z.K. Zhang
Sesia J. Zhao
eBusiness, eEducation and eLogistics
Teaching Enterprise Modeling Based on Multi-Media Simulation: A Pragmatic Approach
239(16)
Ilia Bider
Martin Henkel
Stewart Kowalski
Erik Perjons
Assessing the Potential of RFID Technologies on the Productivity of a Freight Forwarder
255(14)
Ygal Bendavid
Towards Quality-Driven SOA Systems Refactoring Through Planning
269(16)
Mathieu Nayrolles
Eric Beaudry
Naouel Moha
Petko Valtchev
Ahdelwahab Hamou-Lhadj
Author Index 285