2,305 Hits in 9.4 sec

Automated reverse engineering of legacy 4GL information system applications using the ITOC workbench [chapter]

John V. Harrison, Wie Ming Lim
1998 Lecture Notes in Computer Science  
The primary goal of the project is to develop tools to assist in the migration of 4GL information system applications.  ...  This paper describes the tool, evaluates its performance when applied to these applications and provides insight into the development of "industrial strength" re-engineering tools.  ...  Acknowledgements: The authors wish to recognize the contributions of Professor Paul Bailes, Dr. Anthony Berglas and Mr. Ian Peake (CSM), and also Mr. Blair Layton and Mr.  ... 
doi:10.1007/bfb0054218 fatcat:zlso6g3w7bct7cd5mwjuwrkxfm

Capability Development of Customers

Vinay Sharma, Pankaj Madan, Piyush Seth
2011 International Journal of Strategic Technology and Applications  
Against the background of media repression in Nigeria, the article reports on a study that examined the impacts of technology on the journalism business as a way of understanding how citizen-reporters  ...  impact the journalism business in Nigeria.  ...  The conception of quoted articles in SCI, EI and ISTP is based on the assumption that the authors have absorbed and used the references.  ... 
doi:10.4018/jsita.2011040102 fatcat:rvbqwit32fa5jiadh43tn63kuq

Self-adaptive systems: A survey of current approaches, research challenges and applications

Frank D. Macías-Escrivá, Rodolfo Haber, Raul del Toro, Vicente Hernandez
2013 Expert systems with applications  
Finally, the main bottlenecks for the effective application of self-adaptive technology, as well as a set of key research issues on this topic, are precisely identified, in order to overcome current constraints  ...  The main goal of this study is to review recent progress on self-adaptivity from the standpoint of computer sciences and cybernetics, based on the analysis of state-of-the-art approaches reported in the  ...  We are also grateful to Antony Price for his assistance with the editing of this paper.  ... 
doi:10.1016/j.eswa.2013.07.033 fatcat:2gz76hptsfcd7cd2ztd3htaew4

An Empirical Assessment of User Perceptions of Feature versus Application Level Usage

Michael J. Harrison, Pratim Datta
2007 Communications of the Association for Information Systems  
Pratim Datta is an Assistant Professor of Information Systems in the Department of Management and Information Systems at Kent State University.  ...  The paper is an attempt to confirm whether users can perceptively unbundle application software features from the overall applications themselves.  ...  Cohesion, on the other hand, refers to the overall functionality and reusability of the features within an application.  ... 
doi:10.17705/1cais.02021 fatcat:3qcgkefddzamfbn23jbrkghnze

IT controls in the public cloud: Success factors for allocation of roles and responsibilities

Shafaq Khan, Mathew Nicho, Haifa Takruri
2016 Journal of IT Cases and Applications  
Kailash Joshi for several editorial and content improvements made to the manuscript. IT Controls in Public Cloud: Success Factors for Allocation of Roles and Responsibilities pg. 27  ...  Processes  Connected set of activities that show the movement of information.  ...  Migrating to the cloud being an organizational strategy (Iyer & Henderson, 2010) , researchers looked at the strategic alignment model of Henderson and Venkatraman (1993) .  ... 
doi:10.1080/15228053.2016.1237218 fatcat:3wyj47wvhvgevn7qopatqr2lkq

Tools and approaches for developing data-intensive Web applications: a survey

Piero Fraternali
1999 ACM Computing Surveys  
This paper investigates the current situation of Web development tools, both in the commercial and research fields, by identifying and characterizing different categories of solutions, evaluating their  ...  The exponential growth and capillar diffusion of the Web are nurturing a novel generation of applications, characterized by a direct business-to-customer relationship.  ...  -Form-based application development: assistance extends to the construction of interactive, form-based applications for accessing and updating data, and more generally for implementing business functions  ... 
doi:10.1145/331499.331502 fatcat:h62apxo4orhv7a3ckozex3ayvq

A process-oriented service infrastructure for networked enterprises

Gabriel Lukáč, Tomáš Sabol, Martin Tomášek, Karol Furdík
2017 Electronic Commerce Research and Applications  
The first one addresses a business alliance formation based on combining competences, processes and services of several organizations into a single value chain.  ...  Alternatives for enabling technologies for service orchestration, process modelling, and event routing are investigated for the solutions.  ...  Acknowledgments The SPIKE Project was co-funded by the European Commission  ... 
doi:10.1016/j.elerap.2016.11.003 fatcat:fw5bztef65bdja7mf57554wuxa

Q-Data: Using Deductive Database Technology to Improve Data Quality [chapter]

Amit Sheth, Christopher Wood, Vipul Kashyap
1995 Applications of Logic Databases  
Furthermore, we describe our experiences using the deductive database technology in an on-going Q-Data trial attacking a real-world problem with test data from operational systems.  ...  in multiple databases 7], duplicate data produced by di erent methods, organizations and processes, process re-engineering and company reorganizations.  ...  Our e ort to trial Q-Data would not have been e ective without the help of several colleagues in Bellcore's client companies, including Rodolphe Nassif and Jian-Hua Zhu, who discussed real problems and  ... 
doi:10.1007/978-1-4615-2207-2_2 fatcat:lnjxoqocrbc7rnuxgczwdngx3i

Applications To Use Electronic Mail System In The Electronic Management

قيس هاشم
2012 Journal of Economics and Administrative Sciences  
Based on the above we see that these requirements will represent an initial foundation for any evolutionary process.  ...  Oracle takes a lead role because the oracle is used for almost all large application and one of the main applications in which oracle takes its major presence is banking.  ...  Applications To Use Electronic Mail System In The Electronic Management References: -  ... 
doi:10.33095/jeas.v18i65.1168 fatcat:o4cms6h6vbdy7bfidyldrkgqv4

Inter-consortia battles in mobile payments standardisation

Andriew S. Lim
2008 Electronic Commerce Research and Applications  
Stages in the standards-setting process As explained in Chapter 3 that the hypothesis of this study is based on Smits' model, the standards-setting process can be seen as two stages process.  ...  Thus, it can be seen that the literature offers different models of the standards-setting process. Depending on the industry, the stages of the standards-setting process vary.  ...  His research has focused on the standards-setting process of Mobile Payments and has been reported in this thesis.  ... 
doi:10.1016/j.elerap.2007.05.003 fatcat:cb46bbkvnvcajh7lca2kjnhvn4

Design Support for Performance Aware Dynamic Application (Re-)Distribution in the Cloud

Santiago Gomez Saez, Vasilios Andrikopoulos, Frank Leymann, Steve Strauch
2015 IEEE Transactions on Services Computing  
Based on the results of this analyses we then propose an application (re-)distribution design support process, which we evaluate empirically by means of a well-known application.  ...  Database-as-a-service (DBaaS) or Platform-as-a-Service (PaaS), and with them the possibilities in deploying and operating an application partially or completely in the Cloud.  ...  Acknowledgments This research has received funding from the FP7 EU project ALLOW Ensembles (600792), and the German BMBF project ECHO (01XZ13023G).  ... 
doi:10.1109/tsc.2014.2381237 fatcat:dotas7ilanf53pgdvex22cpo2i

Effective Application Maintenance

James D. McKeen, Heather A. Smith
2012 Communications of the Association for Information Systems  
Automation of an organizational process harnesses information technology, usually by acquiring or developing a new application.  ...  This article is based on these discussions. It first examines the root causes of application maintenance and the importance of this issue.  ...  One manager claimed that the adoption of the Capabilities Maturity Model Integration (CMMI) practices by her application development group has improved their IT-related processes and raised the overall  ... 
doi:10.17705/1cais.03005 fatcat:my7bwsgzerh7tbhdlgupzppep4

Migration of Existing or Legacy Software Systems into Web Service-based Architectures (Reengineering Process): A Systematic Literature Review

Siti Rochimah, Alhaji Sheku
2016 International Journal of Computer Applications  
In this study, the techniques of migrating legacy software systems into web service-based architecture has been discussed.  ...  In the case of analytical methods, the migration process is performed by examining the existing legacy software system to distinguish how the migration process can be carried out with limited bottlenecks  ...  It also adopt an SOA meta-model that defines service types along with the semantics of models. There are also rules derived from UML class diagram by forming queries based on design differencing.  ... 
doi:10.5120/ijca2016907801 fatcat:q2giw65unnemhgmeetoevq3lwq

Potential of critical e-applications for engaging SMEs in e-business: a provider perspective

David H Brown, Nigel Lockett
2004 European Journal of Information Systems  
There are three key findings, namely: the emergence of aggregation specific e-business applications; the emergence of collaboratively based "one to many" business models; and the importance of trusted  ...  Against a background of the low engagement of SMEs in e-business this paper investigates the emergence of, and potential for, critical e-applications defined as "an e-business application, promoted by  ...  In addition the authors would like to express their thanks to the Associate Editor and the anonymous reviewers for their helpful comments on the previous versions of this paper, particularly relating to  ... 
doi:10.1057/palgrave.ejis.3000480 fatcat:upoa5u2qbfhfthcmyfqau2hqkm

Enterprise Architecture Frameworks: A Critique Review from a Security Perspective

Bandar M.
2017 International Journal of Computer Applications  
These include achieving their vision in an effective approach and reducing complexity and cost of their systems. These frameworks also aim to make systems collaborate in the most efficient way.  ...  Towards the end of this paper, a critique review of these frameworks and a suggested approach for applying security with regard to certain security design principles at an early stage of development.  ...  The intersection between each column and row forms a cell that represents an aspect of the enterprise modeled from a particular viewpoint [21] .  ... 
doi:10.5120/ijca2017915416 fatcat:ds7zxr2btjb53odkq6ej2bbcju
« Previous Showing results 1 — 15 out of 2,305 results