38 results
Search Results
2. Findings in Data Structures Reported from National Research Institute for Mathematics and Computer Science [Code Specialization for Memory Efficient Hash Tries (Short Paper)]
- Subjects
Computer science ,Business ,Computers - Abstract
2015 JUL 30 (VerticalNews) -- By a News Reporter-Staff News Editor at Computer Technology Journal -- Data detailed on Data Structures have been presented. According to news reporting out of [...]
- Published
- 2015
3. Is big tech draining AI talent from academia?
- Author
-
Woolston, Chris
- Abstract
Movement to industry is raising concerns about the future researcher workforce and maintaining ethical expertise. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
4. Co-NP-Hardness of the Soundness Problem for Asymmetric-Choice Workflow Nets.
- Author
-
Liu, Guanjun and Jiang, Changjun
- Subjects
BUSINESS models ,WORKFLOW ,SOUND ,WORKFLOW management systems ,COMPUTATIONAL complexity - Abstract
van der Aalst et al. proved that the soundness problem is solvable in polynomial time for free-choice workflow nets (FCWF-nets). However, FCWF-nets cannot model most web services composition and interorganizational business processes because the interaction among processes does not usually satisfy the free-choice requirement. Asymmetric-choice workflow nets (ACWF-nets) as a larger class than FCWF-nets can model lots of such cases. Our previous work showed that the (weak) soundness problem is co-NP-hard for three-bounded ACWF-nets. Later, Tiplea et al. proved that for three-bounded acyclic ACWF-nets, the weak soundness problem is co-NP-complete. We sharp these results in this paper. First, we prove that for ACWF-nets, whether they are one-bounded or k -bounded ( k~\boldsymbol > 1 ), the soundness problem is co-NP-hard. Second, it is proven that the soundness is equivalent to the weak soundness for any acyclic ACWF-nets, i.e., an acyclic ACWF-net is sound if and only if it is weakly sound. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
5. An Animated Introduction to Relational Databases for Many Majors.
- Author
-
Dietrich, Suzanne W., Goelman, Don, Borror, Connie M., and Crook, Sharon M.
- Subjects
QUERYING (Computer science) ,RELATIONAL databases ,COMPUTER science education ,BUSINESS ,PEDAGOGICAL content knowledge ,COURSEWARE ,ANIMATION students ,COMPUTER-generated imagery - Abstract
Database technology affects many disciplines beyond computer science and business. This paper describes two animations developed with images and color that visually and dynamically introduce fundamental relational database concepts and querying to students of many majors. The goal is for educators in diverse academic disciplines to incorporate the animations in their existing courses in order to meet their pedagogical needs. The introduction of the animations was assessed and evaluated within several contexts, including non-majors courses offered by computer scientists as well as a course on computational molecular biology. The evaluation indicated that student knowledge of fundamental database concepts improved significantly with the use of the courseware. The animations provide visual learners with an engaging method to learn the topics presented with the ability to replay the dynamic presentation. Overall, the evaluation indicates the accessibility of database topics across the disciplines as well as the specific concepts that need further elaboration. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
6. Work-integrated learning in higher education: Student, teacher and employer motivation and expectations.
- Author
-
ANIČIĆ, KATARINA PAŽUR and DIVJAK, BLAŽENKA
- Subjects
INFORMATION storage & retrieval systems in education ,WORK environment ,SCHOOL environment ,VOCATIONAL guidance ,TEACHING ,COLLEGE teachers ,MOTIVATION (Psychology) ,STAKEHOLDER analysis ,COMPUTER science ,EXECUTIVES ,COLLEGE teacher attitudes ,LEARNING strategies ,QUALITATIVE research ,MASTERS programs (Higher education) ,BUSINESS ,INFORMATION science ,UNIVERSITIES & colleges ,RESEARCH funding ,STUDENT attitudes ,EDUCATION - Abstract
The purpose of this paper is to explore the motivation and expectations of stakeholders (students, teachers, and employers) related to their participation in simulated work-integrated learning (WIL) taking place in a form of work-related projects in an academic environment. Analysis is based on data gathered from 49 students, four teachers and six employers who participated in WIL within four different units of study in Information and Communication Technologies (ICT) at the University of Zagreb, Faculty of Organization and Informatics (FOI), Croatia. The findings of this research revealed that student learning, student career development and increasing quality of learning and teaching are common motivational factors for stakeholders' participation in WIL. Additional factors pertinent to respective stakeholders' motivation and expectations are also detected. The results of this study can help higher education institutions (HEIs) in the organization of WIL practices to increase motivation and meet expectations of all stakeholders. [ABSTRACT FROM AUTHOR]
- Published
- 2022
7. Analyzing E-Commerce Business Process Nets via Incidence Matrix and Reduction.
- Author
-
Yu, Wangyang, Yan, Chungang, Ding, Zhijun, Jiang, Changjun, and Zhou, Mengchu
- Subjects
ELECTRONIC commerce ,MATRICES (Mathematics) ,NETS (Mathematics) - Abstract
E-commerce business process nets (EBPNs) are a novel formal model for describing and validating e-commerce systems including interactive parties such as shopper, merchant, and third-party payment platform. Data errors and nondeterminacy of the data states during the trading process can be depicted with the help of EBPNs. However, the problem about how to analyze EBPNs remains largely open. To analyze their data-liveness, data-boundedness, and reachability, this paper presents two analysis methods. For EBPNs, reachability analysis is proposed based on a 3-D incidence matrix method. Additionally, reduction methods are proposed for a special EBPN. Finally, the validity and reliability of the proposed methods are illustrated via the examples of e-commerce systems. [ABSTRACT FROM PUBLISHER]
- Published
- 2018
- Full Text
- View/download PDF
8. Country branding research: a decade’s systematic review
- Author
-
Ahmed Tijani, Mohammed Majeed, Kwame Simpe Ofori, and Aidatu Abubakari
- Subjects
Country branding ,nation branding ,systematic review ,future research directions ,Ediz Akcay, Bournemouth University Talbot Campus: Bournemouth University, UK ,Technology ,Computer Science ,Management of IT ,Social Sciences ,Economics ,Business ,HF5001-6182 ,Management. Industrial management ,HD28-70 - Abstract
AbstractThe concept of country branding, also referred to as nation or place branding, involves the creation and management of a nation’s image and products to promote various aspects of its identity. This study conducted a systematic review of country branding studies based on articles published between 2010 and 2020. A total of 59 papers were obtained from electronic databases such as Scopus, search engines like Google Scholar, and publishers including Taylor and Francis, Emerald, Elsevier, and Wiley online, using a specific search criterion. Of the 59 articles, only 44 met the inclusion criteria and were included in this review. The results were organised using the theory, context, characteristics, and methods (TCCM) organising approach for systematic literature reviews. The study revealed two dominant research themes: ‘national branding campaign’ and ‘country of origin (COO). Most studies did not use any specific model and the qualitative method was the dominant research method used. The findings of this study provide a roadmap for understanding the literature on country branding and offer directions for future theory building.
- Published
- 2024
- Full Text
- View/download PDF
9. The influence of E-auditing adoption on internal audit department performance amid COVID-19 in Saudi Arabia
- Author
-
Abdulwahab Mujalli
- Subjects
Electronic auditing ,e-auditing usage ,user satisfaction ,Covid-19 ,Saudi Arabia ,Technology ,Computer Science ,CAD CAE CAM - Computing & Information Technology ,Information & Communication Technology (ICT) ,Management of IT ,Engineering & Technology ,Electromagnetics & Communication ,Social Sciences ,Behavioral Sciences ,Cognitive Psychology ,Economic Psychology ,Multidisciplinary Psychology ,Psychological Science ,Communication Studies ,ICT ,Arts & Humanities ,Humanities ,Cultural Studies ,Business ,HF5001-6182 ,Management. Industrial management ,HD28-70 - Abstract
AbstractOver the last decade, rapid advances in information systems (ISs) have greatly reshaped and changed the nature of doing business and how its performance is measured, with Electronic Auditing (E-auditing) emerging as a pivotal element in improving organizational efficiency. This study addresses the challenges faced in manually implementing audits and underscores the necessity for transitioning to electronic audit systems. The manual approach has limitations regarding the accuracy of operations, so to enhance performance, E-auditing is now imperative. The purpose of the study is to evaluate E-auditing in the public sector of Saudi Arabia, utilizing DeLone and McLean’s information system model (DM ISM). The focus is on vital factors including information quality, system quality, service quality, system usage and user satisfaction and their influence on the performance of internal audit departments, particularly during the challenges posed by the recent COVID-19 pandemic. This research employs a quantitative approach, utilizing a self-administered survey questionnaire to collect data from E-auditing users in the Saudi public sector. The study applies partial least squares structural equation modelling (PLS-SEM) to validate the gathered data. Findings reveal that information quality and system quality significantly influence E-auditing usage. While service quality exhibits no marked effect on usage, the study establishes a strong relationship between E-auditing usage and user satisfaction. Effective E-auditing usage and satisfied users contribute convincingly to the improved performance of internal audit departments. The paper concludes with implications, limitations, and suggestions for future studies.
- Published
- 2024
- Full Text
- View/download PDF
10. Evaluating 'startup readiness' for researchers: case studies of research-based startups with biopharmaceutical research topics
- Author
-
Tomotaka Goji, Yuki Hayashi, and Ichiro Sakata
- Subjects
Business ,Computer science ,Pharmaceutical science ,Biotechnology ,Startup readiness ,Research-based startups ,Science (General) ,Q1-390 ,Social sciences (General) ,H1-99 - Abstract
For research domains such as life sciences, which pursue fundamental scientific understanding and applications intended for immediate use, academic entrepreneurship has played a pivotal role in commercialization. This paper presents an evaluation method of researchers related to user-inspired fundamental research, using global databases of startup finances and academic research papers of ''startup readiness.'' Case studies of startups related to biopharmaceutical research topics suggest that the biopharmaceutical field has rich opportunities stemming from scientific research, commercialization, and entrepreneurship. This evaluation method sorts specific industry segments by which financing activities are active, and by which related growing research topics attract increased academic attention. We constructed networks of author citation and co-authorship from paper citation networks related to research topics in industry segments in the biopharmaceutical domain. Results obtained across all research topics we surveyed demonstrated that authors in the top 10% of degree centrality ranking in both networks are far more likely to be startup participants than other authors. Our computational approach might provide convenient, dynamic, global, and real-time understanding of the “startup readiness” of researchers working with research topics for which academic attention is emerging in actively financed biopharmaceutical fields.
- Published
- 2020
- Full Text
- View/download PDF
11. Embedding Hands-On Experience with ERP Systems into University Courses: Aligning Academic and Industry Needs.
- Author
-
Stevenson, Mark
- Subjects
ENTERPRISE resource planning ,COLLEGE graduates ,COMPUTER science ,BUSINESS - Abstract
Enterprise Resource Planning (ERP) systems are widely used by many of the top recruiters of computer science and business school graduates, providing significant business benefits when implemented effectively. While ERP concepts are taught within Universities from a theoretical point of view, few students have any hands-on experience of using an ERP system when they graduate. As a result, there is a significant gap between the way in which ERP concepts are applied in practice and the way in which they are taught in Universities. This paper describes the adoption of new, innovative material during 2006 which enhances two postgraduate courses taught at a leading UK management school and provides students with hands-on experience with an ERP system. It is argued here that this enhances their student experience, improves their employability and increases their 'readiness' for industry, thereby contributing to aligning the objectives of higher education institutions and practitioners. The paper also describes how a number of challenges to incorporating the new material within existing course structures were overcome, providing guidance for fellow academics embarking on similar ventures. Issues discussed include: coping with the uncertainty of new material, maintaining academic integrity and encouraging critical self reflection and learning. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
12. A Role for IEEE in Quantum Computing.
- Author
-
DeBenedictis, Erik P.
- Subjects
QUANTUM computing ,BENCHMARKING (Management) ,ARTIFICIAL intelligence ,COMPUTER science ,TOTAL quality management - Abstract
Will quantum computation become an important milestone in human progress? Passionate advocates and equally passionate skeptics abound. IEEE already provides useful, neutral forums for state-of-the-art science and engineering knowledge as well as practical benchmarks for quantum computation evaluation. But could the organization do more? [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
13. An interdisciplinary approach to coalition formation
- Author
-
Berghammer, Rudolf, Rusinowska, Agnieszka, and De Swart, Harrie
- Subjects
Algebra ,Computer science ,Algorithms ,Algorithm ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2008.02.011 Byline: Rudolf Berghammer (a), Agnieszka Rusinowska (b), Harrie de Swart (c) Keywords: Graph theory; RelView; Relational algebra; Dominance; Stable government Abstract: A stable government is by definition not dominated by any other government. However, it may happen that all governments are dominated. In graph-theoretic terms this means that the dominance graph does not possess a source. In this paper we are able to deal with this case by a clever combination of notions from different fields, such as relational algebra, graph theory and social choice theory, and by using the computer support system RelView for computing solutions and visualizing the results. Using relational algorithms, in such a case we break all cycles in each initial strongly connected component by removing the vertices in an appropriate minimum feedback vertex set. In this way we can choose a government that is as close as possible to being un-dominated. To achieve unique solutions, we additionally apply the majority ranking recently introduced by Balinski and Laraki. The main parts of our procedure can be executed using the RelView tool. Its sophisticated implementation of relations allows to deal with graph sizes that are sufficient for practical applications of coalition formation. Author Affiliation: (a) Institute of Computer Science, University of Kiel, Olshausenstra[sz]e 40, 24098 Kiel, Germany (b) GATE, CNRS, Universite Lumiere Lyon 2, 93 Chemin des Mouilles, B.P.167, 69131 Ecully Cedex, France (c) Department of Philosophy, Tilburg University, P.O. Box 90153, 5000 LE Tilburg, The Netherlands Article History: Received 4 December 2006; Accepted 12 February 2008 Article Note: (footnote) [star] Co-operation for this paper was supported by European COST Action 274 'Theory and Applications of Relational Structures as Knowledge Instruments' (TARSKI).
- Published
- 2009
- Full Text
- View/download PDF
14. Dynamic Web Service discovery architecture based on a novel peer based overlay network
- Author
-
Sioutas, S., Sakkopoulos, E., Makris, Ch., Vassiliadis, B., Tsakalidis, A., and Triantafillou, P.
- Subjects
Web services ,Computer science ,Web services ,Business ,Computers and office automation industries - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.jss.2008.11.845 Byline: S. Sioutas (a), E. Sakkopoulos (b), Ch. Makris (b), B. Vassiliadis (c), A. Tsakalidis (b), P. Triantafillou (b) Keywords: Web Services Discovery; Peer to Peer overlay networks; Databases Abstract: Service Oriented Computing and its most famous implementation technology Web Services (WS) are becoming an important enabler of networked business models. Discovery mechanisms are a critical factor to the overall utility of Web Services. So far, discovery mechanisms based on the UDDI standard rely on many centralized and area-specific directories, which poses information stress problems such as performance bottlenecks and fault tolerance. In this context, decentralized approaches based on Peer to Peer overlay networks have been proposed by many researchers as a solution. In this paper, we propose a new structured P2P overlay network infrastructure designed for Web Services Discovery. We present theoretical analysis backed up by experimental results, showing that the proposed solution outperforms popular decentralized infrastructures for web discovery, Chord (and some of its successors), BATON (and it's successor) and Skip-Graphs. Author Affiliation: (a) Department of Informatics, Ionian University, 7 Tsirigoti Square, 49100 Corfu, Greece (b) Computer Engineering and Informatics Department, University of Patras, Greece (c) Computer Science, Hellenic Open University, Patras, Greece Article History: Received 18 June 2008; Revised 12 November 2008; Accepted 13 November 2008 Article Note: (footnote) [star] Preliminary version of this paper was presented in Proceedings of IEEE International Conference on Information Technology: Coding and Computing, Next - Generation Web and Grid Systems (IEEE/ITCC 2005), pp. 193-198.
- Published
- 2009
- Full Text
- View/download PDF
15. An anomaly prevention approach for real-time task scheduling
- Author
-
Chen, Ya-Shu, Chang, Li-Pin, Kuo, Tei-Wei, and Mok, Aloysius K.
- Subjects
Computer science ,Business ,Computers and office automation industries - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.jss.2008.07.038 Byline: Ya-Shu Chen (a), Li-Pin Chang (b), Tei-Wei Kuo (c), Aloysius K. Mok (d) Keywords: Scheduling anomaly; Real-time task scheduling; Process synchronization; Scheduler stability Abstract: This research responds to practical requirements in the porting of embedded software over platforms and the well-known multiprocessor anomaly. In particular, we consider the task scheduling problem when the system configuration changes. With mutual-exclusive resource accessing, we show that new violations of the timing constraints of tasks might occur even when a more powerful processor or device is adopted. The concept of scheduler stability and rules are then proposed to prevent scheduling anomaly from occurring in task executions that might be involved with task synchronization or I/O access. Finally, we explore policies for bounding the duration of scheduling anomalies. Author Affiliation: (a) Department of Electronic Engineering, National Taiwan University of Science and Technology, Taipei 106, Taiwan (b) Department of Computer Science, National Chiao-Tung University, Hsin-Chu 300, Taiwan (c) Department of Computer Science and Information Engineering, National Taiwan University, Taipei 106, Taiwan (d) Department of Computer Sciences, The University of Texas at Austin, Austin, TX 78712, USA Article History: Received 8 June 2006; Revised 2 July 2008; Accepted 21 July 2008 Article Note: (footnote) [star] This paper is an extended version of the paper that appeared in .
- Published
- 2009
- Full Text
- View/download PDF
16. Exploiting an abstract-machine-based framework in the design of a Java ILP processor
- Author
-
Wang, H.C. and Yuen, C.K.
- Subjects
Computer science ,Business ,Computers and office automation industries - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.sysarc.2008.07.006 Byline: H.C. Wang, C.K. Yuen Keywords: Abstract machine; Java processor; Embedded processor; ILP; VLIW Abstract: Abstract machines bridge the gap between the high-level of programming languages and the low-level mechanisms of a real machine. The paper proposed a general abstract-machine-based framework (AMBF) to build instruction level parallelism processors using the instruction tagging technique. The constructed processor may accept code written in any (abstract or real) machine instruction set, and produce tagged machine code after data conflicts are resolved. This requires the construction of a tagging unit which emulates the sequential execution of the program using tags rather than actual values. The paper presents a Java ILP processor by using the proposed framework. The Java processor takes advantage of the tagging unit to dynamically translate Java bytecode instructions to RISC-like tag-based instructions to facilitate the use of a general-purpose RISC core and enable the exploitation of instruction level parallelism. We detailed the Java ILP processor architecture and the design issues. Benchmarking of the Java processor using SpecJVM98 and Linpack has shown the overall ILP speedup improvement between 78% and 173%. Author Affiliation: Department of Computer Science, School of Computing, National University of Singapore, 3 Science Drive 2, Singapore 117543, Singapore Article History: Received 16 June 2007; Revised 29 April 2008; Accepted 30 July 2008
- Published
- 2009
- Full Text
- View/download PDF
17. A marketing maturity model for IT: Building a customer-centric IT organization.
- Author
-
Hirschheim, Rudy, Schwarz, Andrew, and Todd, Peter
- Subjects
- *
INFORMATION technology , *HIGH technology , *COMPUTER science , *MARKETING , *BUSINESS , *PRODUCT management - Abstract
Despite a variety of management tools, valuable management prescriptions, and the desire of information technology (IT) managers and business managers alike to build a better relationship, the current state of the IT-business relationship is far from ideal. Although many believe the difficulty in managing this relationship is rooted in differences in knowledge, culture, motivation, and language, we argue in this paper that the key to managing relationships is in the frame of reference and that a marketing perspective can prove valuable. We outline how concepts from marketing (e.g., price, product, customer, place, and promotion) are useful within an IT context and propose a marketing maturity model for IT executives to assess how to enhance their relationship with their business counterparts. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
18. Preface.
- Author
-
Jordan, Kirk E.
- Subjects
- *
COMPUTER systems , *COMPUTER science , *DECISION making , *BUSINESS , *SCIENCE - Abstract
This section provides an overview of several articles on deep computing or high-performance computing which are applied to problems that require significant computing resources in order to facilitate relatively complex decision-making in fields ranging from business to the sciences. The papers capture a few illustrations of deep computing that cut across traditional disciplines. Deep computing requires not only massive amounts of computing,but also the processing of vast amounts of data and the use of sophisticated means for the interpretation of results. New algorithmic approaches are being developed that take into account computer architecture in order to address problems of general interest and answer questions that have impact beyond just scientific inquiry. The paper by Crivelli and Head-Gordon discusses a load-balancing technique to exploit the use of parallel architectures for addressing protein structure problems. In their paper, Fann et al. investigate multiwavelet approaches and apply them to areas of computational chemistry, computational electromagnetics, and fluid dynamics. Newns et al. discuss new algorithmic techniques they have developed for improving magnetic recording simulation. The applicability of deep computing to astrophysics is illustrated by the paper by Lake et al. The authors apply new algorithms coupled with deep computing to advance our understanding of the N-body problem.
- Published
- 2004
- Full Text
- View/download PDF
19. Parallel machine scheduling with nested processing set restrictions
- Author
-
Huo, Yumei and Leung, Joseph Y.-T.
- Subjects
Algorithms ,Computer science ,Algorithm ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2009.10.025 Byline: Yumei Huo (a), Joseph Y.-T. Leung (b) Keywords: Nested processing set restrictions; Nonpreemptive scheduling; Makespan; NP-hard; Approximation algorithm; Worst-case bound Abstract: We consider the problem of scheduling a set of n independent jobs on m parallel machines, where each job can only be scheduled on a subset of machines called its processing set. The machines are linearly ordered, and the processing set of job j is given by two machine indexes a.sub.j and b.sub.j; i.e., job j can only be scheduled on machines a.sub.j,a.sub.j+1,...,b.sub.j. Two distinct processing sets are either nested or disjoint. Preemption is not allowed. Our goal is to minimize the makespan. It is known that the problem is strongly NP-hard and that there is a list-type algorithm with a worst-case bound of 2-1/m. In this paper we give an improved algorithm with a worst-case bound of 7/4. For two and three machines, the algorithm gives a better worst-case bound of 5/4 and 3/2, respectively. Author Affiliation: (a) Department of Computer Science, CUNY at Staten Island, Staten Island, NY 10314, USA (b) Department of Computer Science, New Jersey Institute of Technology, Newark, NJ 07102, USA Article History: Received 9 November 2008; Accepted 26 October 2009
- Published
- 2010
20. Adaptive automated construction of hybrid heuristics for exam timetabling and graph colouring problems
- Author
-
Qu, Rong, Burke, Edmund K., and McCollum, Barry
- Subjects
Computer science ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2008.10.001 Byline: Rong Qu (a), Edmund K. Burke (a), Barry McCollum (b) Keywords: Adaptive; Exam timetabling; Graph colouring; Graph colouring heuristics; Hybridisation; Hyper-heuristic Abstract: In this paper, we present a random iterative graph based hyper-heuristic to produce a collection of heuristic sequences to construct solutions of different quality. These heuristic sequences can be seen as dynamic hybridisations of different graph colouring heuristics that construct solutions step by step. Based on these sequences, we statistically analyse the way in which graph colouring heuristics are automatically hybridised. This, to our knowledge, represents a new direction in hyper-heuristic research. It is observed that spending the search effort on hybridising Largest Weighted Degree with Saturation Degree at the early stage of solution construction tends to generate high quality solutions. Based on these observations, an iterative hybrid approach is developed to adaptively hybridise these two graph colouring heuristics at different stages of solution construction. The overall aim here is to automate the heuristic design process, which draws upon an emerging research theme on developing computer methods to design and adapt heuristics automatically. Experimental results on benchmark exam timetabling and graph colouring problems demonstrate the effectiveness and generality of this adaptive hybrid approach compared with previous methods on automatically generating and adapting heuristics. Indeed, we also show that the approach is competitive with the state of the art human produced methods. Author Affiliation: (a) Automated Scheduling, Optimisation and Planning (ASAP) Group, School of Computer Science, University of Nottingham, Wollaton Road, Nottingham NG8 1BB, UK (b) School of Computer Science, Queens University, University Road, Belfast BT7 1NN, N. Ireland, UK Article History: Received 15 August 2006; Accepted 8 October 2008
- Published
- 2009
- Full Text
- View/download PDF
21. An improved multiobjective differential evolution based on Pareto-adaptive I[micro] -dominance and orthogonal design
- Author
-
Gong, Wenyin and Cai, Zhihua
- Subjects
Computer science ,Algorithms ,Algorithm ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2008.09.022 Byline: Wenyin Gong, Zhihua Cai Keywords: Multiobjective optimization; Differential evolution algorithm; Pareto-adaptive I[micro] -dominance; Orthogonal design method Abstract: Evolutionary multiobjective optimization has become a very popular topic in the last few years. Since the 1980s, various evolutionary approaches that are capable of searching for multiple solutions simultaneously in a single run have been developed to solve multiobjective optimization problems (MOPs). However, to find a uniformly distributed, near-complete, and near-optimal Pareto front in a small number of fitness function evaluations (NFFEs) is a challenging task for any multiobjective optimization evolutionary algorithm (MOEA). In this paper, we present an improved differential evolution algorithm to MOPs that combines several features of previous evolutionary algorithms in a unique manner. It is characterized by (a) employing the orthogonal design method with quantization technique to generate the initial population, (b) adopting an archive to store the nondominated solutions and employing the new Pareto-adaptive I[micro]-dominance method to update the archive at each generation, (c) storing the extreme points and inserting them into the final archive in order to remedy one of the limitations of I[micro]-dominance: the loss of the extreme points in the final archive, and (d) using a hybrid selection mechanism in which a random selection and an elitist selection are alternated in order to allow using the archive solution to guide the search towards the Pareto-optimal front. Experiments have been conducted on a number of unconstrained real-valued artificial functions of two and three objectives. The results prove the efficiency of our approach with respect to the quality of the approximation of the Pareto-optimal front and the considerable reduction of NFFEs in these test problems. By examining the selected performance metrics, our approach is found to be statistically competitive with five state-of-the-art MOEAs in terms of keeping the diversity of the individuals along the tradeoff surface, finding a well-approximated Pareto-optimal front and reducing the computational effort. Author Affiliation: School of Computer Science, China University of Geosciences, Wuhan 430074, PR China Article History: Received 17 October 2007; Accepted 22 September 2008
- Published
- 2009
- Full Text
- View/download PDF
22. Complete local search with limited memory algorithm for no-wait job shops to minimize makespan
- Author
-
Zhu, Jie, Li, Xiaoping, and Wang, Qian
- Subjects
Computer science ,Algorithms ,Algorithm ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2008.09.015 Byline: Jie Zhu, Xiaoping Li, Qian Wang Keywords: No-wait; Job shop; Timetabling; Sequencing Abstract: In this paper, no-wait job shop problems with makespan minimization are considered. It is well known that these problems are strongly NP-hard. The problem is decomposed into the sequencing and the timetabling components. Shift timetabling is developed for the timetabling component. An effective method, CLLM (complete local search with limited memory), is presented by integrating with shift timetabling for the sequencing component. Experimental results show that CLLM outperforms all the existing effective algorithms for the considered problem with a little more computation time. Author Affiliation: School of Computer Science and Engineering, Southeast University, 210096 Nanjing, PR China Key Laboratory of Computer Network and Information Integration (Southeast University), Ministry of Education, 210096 Nanjing, PR China Article History: Received 19 October 2007; Accepted 16 September 2008
- Published
- 2009
- Full Text
- View/download PDF
23. Determining factors that affect long-term evolution in scientific application software
- Author
-
Kelly, Diane
- Subjects
Architectural design ,Internet software ,Software ,Computer science ,Software quality ,Business ,Computers and office automation industries - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.jss.2008.11.846 Byline: Diane Kelly Keywords: Scientific software; Characteristics of scientific software development; Long-term software evolution; Empirical study; Model of change Abstract: One of the characteristics of scientific application software is its long lifetime of active maintenance. There has been little software engineering research into the development characteristics of scientific software and into the factors that support its successful long evolution. The research described in this paper introduces a novel model to examine the nature of change that influenced an example of industrial scientific software over its lifetime. The research uses the model to provide an objective analysis of factors that contributed to long-term evolution of the software system. Conclusions suggest that the architectural design of the software and the characteristics of the software development group played a major role in the successful evolution of the software. The novel model of change and the research method developed for this study are independent of the type of software under study. Author Affiliation: Royal Military College of Canada, Department of Mathematics and Computer Science, Kingston, Ontario, Canada Article History: Received 2 June 2008; Revised 21 November 2008; Accepted 23 November 2008
- Published
- 2009
- Full Text
- View/download PDF
24. Improving energy efficiency for flash memory based embedded applications
- Author
-
Song, Hyungkeun, Choi, Sukwon, Cha, Hojung, and Ha, Rhan
- Subjects
Flash memory -- Energy use ,Energy management systems -- Energy use ,Energy consumption ,Computer science ,Energy efficiency ,Flash memory ,Business ,Computers and office automation industries - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.sysarc.2008.07.004 Byline: Hyungkeun Song (a), Sukwon Choi (a), Hojung Cha (a), Rhan Ha (b) Keywords: Energy-aware embedded systems; Flash memory file system; JFFS2 Abstract: The JFFS2 file system for flash memory compresses files before actually writing them into flash memory. Because of this, multimedia files, for instance, which are already compressed in the application level go through an unnecessary and time-consuming compression stage and cause energy waste. Also, when reading such multimedia files, the default use of disk cache results in unnecessary main memory access, hence an energy waste, due to the low cache hit ratio. This paper presents two techniques to reduce the energy consumption of the JFFS2 flash file system for power-aware applications. One is to avoid data compression selectively when writing files, and the other is to bypass the page caching when reading sequential files. The modified file system is implemented on a PDA running Linux and the experiment results show that the proposed mechanism effectively reduces the overall energy consumption when accessing continuous and large files. Author Affiliation: (a) Department of Computer Science, Yonsei University, Seodaemun-gu, Shinchon-dong 134, Seoul 120-749, Republic of Korea (b) Department of Computer Engineering, Hongik University, Mapo-gu, Sangsoo-Dong 72-1, Seoul 121-791, Republic of Korea Article History: Received 30 June 2006; Revised 18 April 2008; Accepted 14 July 2008
- Published
- 2009
- Full Text
- View/download PDF
25. Tariff concessions in production sourcing
- Author
-
Guo, Yunsong, Li, Yanzhi, Lim, Andrew, and Rodrigues, Brian
- Subjects
Algorithms ,Tariffs ,Management science ,Computer science ,Algorithm ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2007.03.004 Byline: Yunsong Guo (a), Yanzhi Li (b), Andrew Lim (c), Brian Rodrigues (d) Keywords: Production sourcing; Tariffs; Heuristics Abstract: In this paper, we study a multi-stage production sourcing problem where tariff concessions can be exploited at the firm level using free trade agreements between countries. To solve the problem, an algorithm which embeds a very large-scale neighborhood (VSLN) search into a simulated annealing framework is developed. A numerical study is conducted to verify the effectiveness of the solution approach. Author Affiliation: (a) Department of Computer Science, Cornell University, Ithaca, NY 14853, USA (b) Department of Management Sciences, City University of Hong Kong, Tat Chee Avenue, Kowloon, Hong Kong (c) Department of IELM, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong (d) Lee Kong Chian School of Business, Singapore Management University, 50 Stamford Road, Singapore 178899, Singapore Article History: Received 14 September 2005; Accepted 21 March 2007
- Published
- 2008
26. Applying relational algebra and RelView to coalition formation
- Author
-
Berghammer, Rudolf, Rusinowska, Agnieszka, and De Swart, Harrie
- Subjects
Game theory ,Computer science ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2006.01.022 Byline: Rudolf Berghammer (a), Agnieszka Rusinowska (b)(c), Harrie de Swart (d) Keywords: Game theory; RelView; Relational algebra; Coalition formation; Feasible government; Dominance; Stable government Abstract: We present an application of relational algebra to coalition formation. This leads to specifications, which can be executed with the help of the RelView tool after a simple translation into the tool's programming language. As an example we consider a simplification of the situation in Poland after the 2001 elections. Author Affiliation: (a) Institute of Computer Science, University of Kiel, OlshausenstraAe 40, 24098 Kiel, Germany (b) Nijmegen School of Management, Radboud University Nijmegen, P.O. Box 9108, 6500 HK Nijmegen, The Netherlands (c) Department of Mathematical Economics, Warsaw School of Economics, Al. Niepodleglosci 162, 02-554 Warsaw, Poland (d) Department of Philosophy, Tilburg University, P.O. Box 90153, 5000 LE Tilburg, The Netherlands Article History: Received 29 June 2005; Accepted 13 January 2006 Article Note: (footnote) [star] Co-operation for this paper was supported by European COST Action 274 'Theory and Applications of Relational Structures as Knowledge Instruments' (TARSKI). We are grateful to two anonymous referees for some useful suggestions.
- Published
- 2007
27. Second order symmetric duality in multiobjective programming involving generalized cone-invex functions
- Author
-
Mishra, S.K. and Lai, K.K.
- Subjects
Management science ,Computer science ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2005.11.024 Byline: S.K. Mishra (a), K.K. Lai (b) Keywords: Second order symmetric duality; Multiobjective programming; Cone-pseudo-invexity Abstract: In this paper, cone-second order pseudo-invex and strongly cone-second order pseudo-invex functions are defined. A pair of Mond-Weir type second order symmetric dual multiobjective programs is formulated over arbitrary cones. Weak, strong and converse duality theorems are established under aforesaid generalized invexity assumptions. A second self-duality theorem is also given by assuming the functions involved to be skew-symmetric. Author Affiliation: (a) Department of Mathematics, Statistics and Computer Science, College of Basic Sciences and Humanities, G.B. Pant University of Agriculture and Technology, Pantnagar 263 145, India (b) Department of Management Sciences, City University of Hong Kong, Tat Chee Avenue, Kowloon, Hong Kong and College of Business Administration, Hunan University, Changsha, China Article History: Received 24 September 2004; Accepted 23 November 2005 Article Note: (footnote) [star] The research of first author is supported by the Department of Science and Technology, Ministry of Science and Technology, New Delhi, Government of India under SERC Fast Track Scheme for Young Scientists 2001-2002 through grant No. SR/FTP/MS-22/2001.
- Published
- 2007
28. Searching for multiobjective preventive maintenance schedules: Combining preferences with evolutionary algorithms
- Author
-
Quan, Gang, Greenwood, Garrison W., Liu, Donglin, and Hu, Sharon
- Subjects
Algorithms ,Computer science ,Algorithm ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2005.12.015 Byline: Gang Quan (a), Garrison W. Greenwood (b), Donglin Liu (c), Sharon Hu (c) Keywords: Evolutionary computations; Scheduling; Utility theory; Preventive maintenance; Multi-objective optimization Abstract: Heavy industry maintenance facilities at aircraft service centers or railroad yards must contend with scheduling preventive maintenance tasks to ensure critical equipment remains available. The workforce that performs these tasks are often high-paid, which means the task scheduling should minimize worker idle time. Idle time can always be minimized by reducing the workforce. However, all preventive maintenance tasks should be completed as quickly as possible to make equipment available. This means the completion time should be also minimized. Unfortunately, a small workforce cannot complete many maintenance tasks per hour. Hence, there is a tradeoff: should the workforce be small to reduce idle time or should it be large so more maintenance can be performed each hour? A cost effective schedule should strike some balance between a minimum schedule and a minimum size workforce. This paper uses evolutionary algorithms to solve this multiobjective problem. However, rather than conducting a conventional dominance-based Pareto search, we introduce a form of utility theory to find Pareto optimal solutions. The advantage of this method is the user can target specific subsets of the Pareto front by merely ranking a small set of initial solutions. A large example problem is used to demonstrate our method. Author Affiliation: (a) Department of Computer Science and Engineering, University of South Carolina, Columbia, SC 29208, USA (b) Department of Electrical and Computer Engineering, Portland State University, Portland, OR 97207, USA (c) Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, IN 46556, USA
- Published
- 2007
29. A graph-based hyper-heuristic for educational timetabling problems
- Author
-
Burke, Edmund K., McCollum, Barry, Meisels, Amnon, Petrovic, Sanja, and Qu, Rong
- Subjects
Computer science ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2005.08.012 Byline: Edmund K. Burke (a), Barry McCollum (b), Amnon Meisels (c), Sanja Petrovic (a), Rong Qu (a) Keywords: Heuristics; Graph heuristics; Hyper-heuristics; Tabu search; Timetabling Abstract: This paper presents an investigation of a simple generic hyper-heuristic approach upon a set of widely used constructive heuristics (graph coloring heuristics) in timetabling. Within the hyper-heuristic framework, a tabu search approach is employed to search for permutations of graph heuristics which are used for constructing timetables in exam and course timetabling problems. This underpins a multi-stage hyper-heuristic where the tabu search employs permutations upon a different number of graph heuristics in two stages. We study this graph-based hyper-heuristic approach within the context of exploring fundamental issues concerning the search space of the hyper-heuristic (the heuristic space) and the solution space. Such issues have not been addressed in other hyper-heuristic research. These approaches are tested on both exam and course benchmark timetabling problems and are compared with the fine-tuned bespoke state-of-the-art approaches. The results are within the range of the best results reported in the literature. The approach described here represents a significantly more generally applicable approach than the current state of the art in the literature. Future work will extend this hyper-heuristic framework by employing methodologies which are applicable on a wider range of timetabling and scheduling problems. Author Affiliation: (a) Automated Scheduling Optimization and Planning Group, School of CSiT, University of Nottingham, Nottingham NG8 1BB, UK (b) School of Computer Science, Queen's University Belfast, Belfast BT7 1NN, UK (c) Department of Computer Science, Ben-Gurion University, Beer-Sheva 84 105, Israel Article History: Received 21 September 2004; Accepted 18 August 2005
- Published
- 2007
30. Obligation rules for minimum cost spanning tree situations and their monotonicity properties
- Author
-
Tijs, Stef, Branzei, Rodica, Moretti, Stefano, and Norde, Henk
- Subjects
Cancer -- Research ,Algorithms ,Universities and colleges ,Management science ,Computer science ,Oncology, Experimental ,Algorithm ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2005.04.036 Byline: Stef Tijs (a), Rodica Branzei (b), Stefano Moretti (c), Henk Norde (d) Keywords: Cost allocation; Minimum cost spanning tree situations; Cost monotonicity; Population monotonic allocation schemes Abstract: We consider the class of Obligation rules for minimum cost spanning tree situations. The main result of this paper is that such rules are cost monotonic and induce also population monotonic allocation schemes. Another characteristic of Obligation rules is that they assign to a minimum cost spanning tree situation a vector of cost contributions which can be obtained as product of a double stochastic matrix with the cost vector of edges in the optimal tree provided by the Kruskal algorithm. It turns out that the Potters value (P-value) is an element of this class. Author Affiliation: (a) Department of Mathematics, University of Genoa, Italy and CentER and Department of Econometrics and Operations Research, Tilburg University, P.O. Box 90153, 5000 LE Tilburg, The Netherlands (b) Faculty of Computer Science, 'Alexandru Ioan Cuza' University, Carol I Bd., 11, 6600 Iasi, Romania (c) Unit of Molecular Epidemiology, National Cancer Research Institute of Genoa and Department of Mathematics, University of Genoa, Via Dodecaneso, 35, 16146 Genoa, Italy (d) CentER and Department of Econometrics and Operations Research, Tilburg University, P.O. Box 90153, 5000 LE Tilburg, The Netherlands Article History: Received 28 July 2004; Accepted 11 April 2005 Article Note: (footnote) [star] The authors thank two anonymous referees for their careful and valuable comments.
- Published
- 2006
31. Mathematical programming models and algorithms for a class-faculty assignment problem
- Author
-
Al-Yakoob, Salem M. and Sherali, Hanif D.
- Subjects
Algorithms ,Universities and colleges ,Computer science ,Algorithm ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2005.01.052 Byline: Salem M. Al-Yakoob (a), Hanif D. Sherali (b) Keywords: Timetabling; Class scheduling; Mixed-integer programming; Employee scheduling; Gender policies Abstract: This paper presents mathematical programming models for assigning faculty members to classes including, among typical academic class scheduling issues, certain specialized central policies at Kuwait University. The time-slots for classes are initially assumed to be given and an integer programming model (CFAM) is constructed to solve the resulting problem, which aims to minimize the individual and collective dissatisfaction of faculty members in a fair fashion, where dissatisfaction is measured by a function of the assignment of faculty members to time-slots and specific classes. In order to enhance the quality of results obtained in practice, the model is modified (ECFAM) so that the time-slots for the classes can be changed, however, with restrictions related to efficient facility utilization and permitting an administratively regulated maximum number of changes. Gender-based modeling considerations are also introduced in order to maintain desirable class offering patterns. Computational results are presented based on solving the models directly by the CPLEX-MIP (version 7.5) package and also using a specialized LP-based heuristic. The faculty schedules generated via the proposed approach based on a number of case studies related to the Department of Mathematics and Computer Science at Kuwait University reveal that this approach yields improved schedules in terms of fairness and enhanced satisfaction levels among faculty members. Author Affiliation: (a) Department of Mathematics and Computer Science, College of Science, Kuwait University, P.O. Box 5969, Safat 13060, Kuwait (b) Grado Department of Industrial and Systems Engineering (0118), Virginia Polytechnic Institute and State University, Blacksburg, VA 24061, United States Article History: Received 11 May 2004; Accepted 28 January 2005
- Published
- 2006
32. Optimality and duality for a multi-objective programming problem involving generalized d-type-I and related n-set functions
- Author
-
Mishra, S.K., Wang, S.Y., and Lai, K.K.
- Subjects
Management science ,Computer science ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2005.02.062 Byline: S.K. Mishra (a), S.Y. Wang (b)(d), K.K. Lai (c)(d) Keywords: Multi-objective programming; n-set functions; Optimality; Duality; Generalized convexity Abstract: In this paper, we introduce several generalized convexity for a real-valued set function and establish optimality and duality results for a multi-objective programming problem involving generalized d-type-I and related n-set functions. Author Affiliation: (a) Department of Mathematics, Statistics and Computer Science, College of Basic Sciences and Humanities, Govind Ballabh Pant University of Agriculture and Technology, Pantnagar 263 145, India (b) Institute of Systems Science, Academy of Mathematics and Systems Sciences, Chinese Academy of Sciences, Beijing 100080, China (c) Department of Management Sciences, City University of Hong Kong, Tat Chee Avenue, Kowloon, Hong Kong (d) College of Business Administration, Hunan University, Changsha, China Article History: Received 3 November 2003; Accepted 21 February 2005 Article Note: (footnote) [star] The research was supported by the Department of Science and Technology, Ministry of Science and Technology, Government of India under SERC Fast Track Scheme for Young Scientists 2001-2002 through grant No. SR/FTP/MS-22/2001 and The National Natural Science Foundation of China.
- Published
- 2006
33. SE and CS Collaboration: Training Students for Engineering Large, Complex Systems
- Author
-
Mohammad Nauman and Muhammad Uzair
- Subjects
Software engineering ,computer science ,education ,complex systems ,Economic theory. Demography ,HB1-3840 ,Business ,HF5001-6182 ,Social sciences (General) ,H1-99 - Abstract
Today’s software industry is characterized by fast growth and diversity. To engineer software in such an environment, software engineers are required to work with large teams and handle large complex systems, involving common off-the-shelf components, open source software and outsourced resources. This poses a serious challenge for software engineering institutions. In this paper, we outline a framework for collaboration among computer science and software engineering programmes within a university with the goal of training students for engineering large, complex systems. We chart a three phase layout for the framework in which students of both programmes work together to simulate the industry’s practices by designing, building, integrating and testing a large, complex system. We consider the issue of evaluating students in such a framework and give alternatives for certain variables so as to fit the framework in different environments.
- Published
- 2007
- Full Text
- View/download PDF
34. Nothing is as Clear as Unclear.
- Author
-
Iivari, Juhani
- Subjects
INFORMATION science ,SCIENCE ,INFORMATION technology ,COMPUTER science ,BUSINESS - Abstract
The article presents a respone by the author to several comments to his essay on information systems (IS). According to the author, design science in IS is chiefly introduced as a contrast to natural-behavioral science research. It also clarifies that the idea of typology of information technology (IT) artifacts in the author's essay was to draw a line between IS and its sister disciplines within computing. It adds that IS in particular are more intertwined with the business environment than they were 20 years ago.
- Published
- 2007
35. Forget stuffing the ballot box - new concern is hacking voting machines
- Subjects
Computer crimes ,Political parties -- Pennsylvania ,Computer science ,Voting machines ,Computer hackers ,Election fraud ,Hacker ,Computer crime ,Business ,General interest ,Business, regional - Abstract
Byline: Chris Potter PITTSBURGH _ Ever since Pennsylvania began using computerized voting machines a decade ago, critics have worried that hackers could throw an election by shifting votes from one [...]
- Published
- 2016
36. Data on Computers Detailed by Researchers at Department of Computer Science & Engineering (Real-time DDoS attack detection using FPGA)
- Subjects
Denial of service attacks ,Computer science ,Programmable logic arrays ,Programmable logic array ,Business ,Computers - Abstract
2017 OCT 26 (VerticalNews) -- By a News Reporter-Staff News Editor at Computer Technology Journal -- Researchers detail new data in Computers. According to news reporting out of Tezpur, India, [...]
- Published
- 2017
37. Rowan computer professor pushes the right buttons
- Subjects
Google Inc. ,Information services industry ,Information services ,Computer science ,Information services industry ,Business ,General interest ,Business, regional ,Rowan University - Abstract
Byline: Jonathan Lai Jan. 06--Jennifer Kay bends down to push the orange button on the controller of her small, gray Lego robot. It comes to life, executing a series of [...]
- Published
- 2014
38. Study Results from National Institute for Research in Computer Science and Control (INRIA) Broaden Understanding of World Wide Web
- Subjects
World Wide Web ,Computer science ,World Wide Web ,Business ,Computers - Abstract
By a News Reporter-Staff News Editor at Internet Weekly News -- Current study results on World Wide Web have been published. According to news reporting originating from Grenoble, France, by [...]
- Published
- 2013
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.