Algorithm (183) | ![]() |
Computer science (145) | ![]() |
Speech recognition (3) | ![]() |
1 1. 2. Computer sciences, the Internet and mass media...7 1. 2. 1. Example of applying environmental principles...
The invention of the computer and the quick development of computer science has had a very significant impact on our lives. 1. 2. Computer science, the Internet and mass media Computers
Other techniques of knowledge discovery, such as neural networks, genetic algorithms, induction or other multistrategy machine learning hybrid tools PIA 91
Google also developed a machine-learning algorithm (artificial intelligence (AI)) that learns from operational data to model plant performance
computer science, social science, physics, biology, engineering, design, architecture and philosophy. A strong multidisciplinary and collaborative approach is the key requirement for large-scale technology innovation and the development of effective applications8.
and requires collaboration between the future users, computer science and IT as well as from the social sciences. Ambient assisted living involves technologies such as sensors, specific equipment, robotics, user interaction (multimodal interfaces) and simulation platforms.
Most computer science training teaches how to think about âoedataâ (classifying things), whereas artificial intelligence enables us to learn how to think about âoeknowledgeâ (problem-solving).
For example, the seeker can design an image processing algorithm to automatically/semiautomatically perform segmentation on stacks of images of the esophagus. 2 https://www. innocentive. com/ar/challenge.
A multidisciplinary approach ranging from computer science to molecular biology, integrating knowledge from the East and the West, is applied in this research.
example of eco-design processâ, Federated Conference on Computer science and Information systems, Krakow, Poland, 2013. MER 13b MERCIER-LAURENT E.,âoeinnovating corporate management:
, 181 business model, 107 innovation, 62,126, 155 intelligence, 64,72, 113 watch, 79 computer science, 7â 11,21, 26,69, 132 computers, 7, 13,15, 16,52
consequences of global business 1. 2. Computer science, the Internet and mass media 1. 2. 1. Example of applying environmental principles 1. 2. 2. Artificial intelligence 1. 2
Computer science-Research and development, 23 (2), 47â 65. Weske, M. 2007. Concepts, languages, architectures (Vol. 14. Berlin:
Driving behaviour parameters were measured by advanced signal-processing algorithms, filtering GPS data combined with sensor fusion from the accelerometer and gyroscope in the smartphone,
Just like computer science emerged as a new discipline from mathematics when computers became abundantly available,
Formal methods for web services (Lecture Notes in Computer science, Vol. 5569, pp. 42â 88. Berlin:
In Sixth International Conference on Extending Database Technology (Lecture Notes in Computer science, Vol. 1377, pp. 469â 483.
Proceedings of the 10th International Conference on Fundamental Approaches to Software engineering (FASE 2007)( Lecture Notes in Computer science, Vol. 4422, pp. 245â 259.
International Conference on Business Process Management (BPM 2007)( Lecture Notes in Computer science, Vol. 4714, pp. 375â 383.
A region-based algorithm for discovering petri nets from event logs. In Business Process Management (BPM2008)( pp. 358â 373.
Business Process Management Workshops, Workshop on Business Process Intelligence (BPI 2006)( Lecture Notes in Computer science, Vol. 4103, pp. 81â 92.
Business Process Management (BPM 2010)( Lecture Notes in Computer science, Vol. 6336, pp. 211â 226. Berlin:
Applications and Theory of Petri Nets 2010 (Lecture Notes in Computer science, Vol. 6128, pp. 226â 245.
Combining evidence from past sales data, forecasting algorithms as well as observations and evidence from how store managers operate,
M. Dumas(*)â¢F. M. Maggi Institute of Computer science, University of Tartu, J. Liivi 2, Tartu 50409, Estonia e-mail:
Here, a fault detection algorithm (local outlier factor) is used to estimate the probability of a fault occurring.
Acknowledgments This work is supported by ERDF via the Estonian Centre of Excellence in Computer science. References Birukou
Theory and experiments with perceptron algorithms. In Proceedings of the ACL conference on empirical methods in natural language processing (pp. 1â 8). Philadelphia, PA:
However, most of the existing techniques and algorithms only take activities into account. There are several different approaches for the automatic detection of correspondences.
so that the algorithm is able to determine whether a node should be an activity or an event (in case of EPCS).
The Refmod-Mine/NSCM algorithm conducts an n-ary cluster matching, thus, the nodes of all models which should be matched are being compared pairwise,
& Flynn, 1999) cluster algorithms start with clusters of size 1 (activities) and consolidates two activities to a cluster
Finally, the algorithm returns binary simple or complex matches for the nodes of each model pair. 4. 2 Structural Analogies One of the main problems in reference modelling is the identification of correspondences (cf. 4. 1)
In order to match (cf. 4. 1) further elements, it is necessary to use advanced mapping algorithms that are able to identify antonyms like âoeinvoice settledâ and âoepayment receivedâ.
The MCC algorithm comprises three main steps: In the first step, a set of candidaterelations is calculated out of the existing nodes and edges in given Fig. 2 Structural analogue process chains Identification of Business Process Models in a Digital World
the algorithm is also able to present a completely integrated model containing all nodes of the underlying process models
The second layer contains concepts and algorithms which support the analysis of individual enterprise models and the derivation of a reference model.
â¢an application of the inductive method to develop new reference models and â¢the development and application of techniques and algorithms for the corpus development.
An algorithm for suffix stripping. Readings in information retrieval (pp. 313â 316. San francisco, CA: Morgan Kaufmann.
They propose using algorithms to parse labels written by modelers in order to detect grammatical mistakes and to prompt users to fix them. 3. 2 Use a Glossary As naming conventions only refer to standardizing the grammatical part,
An algorithm can then parse his sentence and deconstruct it into its parts. This allows not only a verification of the phrase structure, i e.,
Not only can this help to create more clearly arranged models (provided that the algorithm is good),
These conventions should be codified in the form of a layout algorithm which is the same for each modeler.
rmfl@cin. ufpe. br H. A. Reijers Department of mathematics and Computer science, Eindhoven University of Technology, Den Dolech 2, 5612 AZ Eindhoven, The netherlands e-mail:
Decision-making algorithms can be used to compile and present to the user recommendations about how to perform their job in alignment with the organ-izationâ s priorities.
a decision algorithm is employed automatically to determine the recommended path to be followed by the user.
Then, using all these pieces of information it becomes possible to identify points for integrating concrete control activities into workflows. This can be realized by having automated search algorithms check the actual control parameters against the workflow instance information.
He has a background in business economics und computer science and has obtained his economic doctorate degree from the Martin-Luther-University Halle-Wittenberg in 2013.
Curricula Vitae 293 Ricardo Massa F. Lima Federal University of Pernambuco, Brazil Ricardo Massa F. Lima received the Ph d. degree in computer science from Federal University
He is the Vice-Coordinator of UFPEÂ s computer science postgraduate program. His main research interests include compiler construction and optimi-zation
He received a Ph d. in Computer science in 2010 from University of Bari. Curricula Vitae 295 Monika Malinova Vienna University of Economics and Business, Austria Monika Malinova is a teaching
of Pernambuco (Recife, Brazil) in 2008 and his Ph d. degree in computer science from the Center for Informatics, Federal University of Pernambuco (Recife, Brazil), in 2014.
He received a Ph d. in Computer science (2002), A m. Sc. in Computer science (1994), and A m. Sc. in Technology and Society (1994), all from TU/e. Hajo wrote his Ph d. thesis on the topic of BPM for the service industry
Walter studied computer science at the Brandenburg University of Technology (BTU. His research activities include business process management, software development and graph theory.
such as its search algorithms, and advertising data. 6 And â as we would expect of a dynamic,
as such, need algorithms to achieve the maximum power point which must be considered in the design of the power electronics interface. 3) Bidirectional power flow:
G#2v 7685 Computer science G#3v 7686 Approximate string matching 0#4#approximate string matching Approximate string matching G#3v 7687 Computation
G#3v 7745 Computer science G#4v 7746 Algorithm G#5v 7747 Algorithm 0#6#algorithm Algorithm
G#5v 7748 Genetic algorithm 0#6#genetic algorithm Genetic algorithm G#5v 7749 Optimization algorithm 0#6#optimization algorithm Optimization algorithm
G#4v 7750 Computer science 0#5#computer science Computer science G#4v 7751 Speech recognition 0#5#speech recognition Speech recognition
G#3v 7752 Distributed computing 0#4#distributed computing Distributed computing 0#4#distributed systems Distributed computing G#3v 7753 Formal language
0#4#formal language Formal language G#3v 7754 Theory of computation 0#4#theory of computation Theory of computation G#2v 7755 Computing
G#3v 7756 Booting 0#4#booting Booting 0#4#booting up Booting G#3v 7757 Bus mastering
0#4#bus mastering Bus mastering G#3v 7758 Computing 0#4#computing Computing G#3v 7759 Docking station
0#4#docking station Docking station G#3v 7760 Upgrade 0#4#upgrade Upgrade G#2v 7761 Information system
0#3#information system Information system G#2v 7762 Information technology 0#3#information technology Information technology G#2v 7763 Software engineering
0#3#software engineering Software engineering G#1v 6925 Crowdsourcing 0#2#crowdsource Crowdsourcing 0#2#crowdsourcing Crowdsourcing
G#1v 6926 Cryptography 0#2#cryptographer Cryptography 0#2#cryptography Cryptography G#1v 6927 Cryptology
G#2v 6928 Cryptology 0#3#cryptographic key Cryptology 0#3#cryptologist Cryptology 0#3#cryptology Cryptology
For example, using the internet to send algorithms for 3-D printed prosthetic limbs designed for war victims in developing countries for local production and use
analytics and closed algorithms x How to mitigate the digital divide, in terms of access, affordablity, skills and use, whereby some
April 2012 by the two Stanford computer science professors Andrew Ng and Daphne Koller. Four months later
with an MA in Computer science at UNICAMP, Brazil. Previously, she was Senior Researcher at CPQD in Brazil coordinating R&d projects related to the digital divide
of Information Engineering and Computer science of the University of Trento (Italy. As a sociologist who has worked always in interdisciplinary environments,
Such evaluation can be delegated to algorithms, like in the case of Google Pagerank, where search results are ordered according to different criteria such as relative
a worldwide basis, the separate disciplines of design, engineering, computer science, business and marketing have developed to a point that an integrated framework for the development of
with an MA in Computer science at UNICAMP, Brazil. Previously, she was Senior Researcher at CPQD in Brazil coordinating R&d projects related to the digital divide
of Information Engineering and Computer science of the University of Trento (Italy. As a sociologist who has worked always in interdisciplinary environments,
Such evaluation can be delegated to algorithms, like in the case of Google Pagerank, where search results are ordered according to different criteria such as relative
A Faster Algorithm for Betweenness Centrality, Journal of Mathematical Sociology 25 (2): 163-177 Clauset, A. et al.
diverse and complementary fields (art and design, computer science, engineering, lin -guistics, evidence-based medicine, psychology),
Community detection algorithms can be used to find dense substructures (often called âoecommunitiesâ) within a larger and often sparse network.
model between biological behaviour and the behaviour of the software, based on theoretical computer science implications and leading to an evolutionary, self-organising,
Computer science is concerned with the construction of new languages and algorithms in order to produce novel desired computer behaviours.
and interpreted by algorithms through highly normative processes This smart infrastructure is also increasingly âoegetting to know peopleâ by aggregating personal and social
case, the likelihood ratio is given under two distributions fitted by the Kolmogorov-smirnov test algorithm and it is simply the likelihood of the first ratio over the second ratio
we can run the above algorithms on it to determine if the data is sufficient. The MATLAB code developed by Aaron Clauset at the Santa fe Institute was used (http
Community detection algorithms can be used to find dense substructures (often called âoecommunitiesâ within a larger sparse network.
than 10,000 organisations) we will use the Newman algorithm to identify communities. We will also find
We can also reverse the algorithm and find communities that need a bridge to other communities (see Fig
exclusive access to the data and algorithms needed for innovative digital research. Yet, perhaps surprising
-eral Github users (carried out by the School of Computer science and the Center for the Future of Work, Heinz College and Carnegie mellon
Using a smart search algorithm the platform immediately asks the 100 closest Peerby neighbours if
-graduates applying to study Computer science. Upton has hypothesised that this drop in skills and interest was related to disappearance of open
and interpreted by algorithms through highly normative processes This smart infrastructure is also increasingly âoegetting to know peopleâ by aggregating personal and social
case, the likelihood ratio is given under two distributions fitted by the Kolmogorov-smirnov test algorithm and it is simply the likelihood of the first ratio over the second ratio
we can run the above algorithms on it to determine if the data is sufficient. The MATLAB code developed by Aaron Clauset at the Santa fe Institute was used (http
Community detection algorithms can be used to find dense substructures (often called âoecommunitiesâ within a larger sparse network.
than 10,000 organisations) we will use the Newman algorithm to identify communities. We will also find
We can also reverse the algorithm and find communities that need a bridge to other communities (see Fig
exclusive access to the data and algorithms needed for innovative digital research. Yet, perhaps surprising
-eral Github users (carried out by the School of Computer science and the Center for the Future of Work, Heinz College and Carnegie mellon
Using a smart search algorithm the platform immediately asks the 100 closest Peerby neighbours if
-graduates applying to study Computer science. Upton has hypothesised that this drop in skills and interest was related to disappearance of open
third of all Masters and Ph d. graduates in electrical engineering and computer science from Canadian universities. This concentration is even more visible in the telecommunications
biology, computer sciences, mechanical engineering and material sciences. Acquiring such knowledge is particularly time-consuming, and many higher education institutions are not
Computer science Lomonosov Moscow State university (MSU Lars Mathiesen Nykredit 2002 â today CIO and Executive Vice president
Computer science Deakin University Herman de Prins UCB 2009 â today CIO, UCB 2007 â 2009
wide range of creative digital learning tools such computer algorithms for analyzing student writing and providing instantaneous user feedback in online media simulations.
digital technology, from algorithms to artificial intelligence. These will also help to resolve on a structural level the issue of academic integrity in a digital age
with Columbia University computer science Professor Steven Feiner, the author developed in the late 1990s real-world AR enhancements described as a âoesituated documentaryâ (HÃ llerer, Feiner
intelligence authoring system. â The algorithms the system uses are highly effective and have attracted dozens of companies,
The companyâ s ambition is for the algorithm to write every story for an audience of
news. Algorithm-driven news reporting and writing is already transforming a variety of journalism domains, especially where formulaic approaches are common.
A Faster Algorithm for Betweenness Centrality, Journal of Mathematical Sociology 25 (2): 163-177 Clauset, A. et al.
runs their activities, usually in partnership with business or computer science professors who can ensure pipelines of students.
Using some advance algorithms on the multivariate analysis results, we try to assess the patterns existing among the variables,
module and a localisation algorithm, as well as having developed information services for multimodal forms of transport.
which employs an algorithm using two different but mathematically related"keys":"one for creating a digital signature
In the following table we have the clustering algorithm results for the variable âoepercentage of employees that have internet access at their workplaceâ.
algorithm is a statistical technique that tests the relationship between analysed variables If the Chi-square statistic is significant at a certain alpha level
In this address you can find a Black box program to use a genetic algorithm that helps optimise your
The various CAD packages use a number of different algorithms to rep -resent solid objects.
2009 International Association of Computer science and Information technology-Spring Conference 978-0-7695-3653-8/09 $25. 00 Â 2009 IEEE
algorithms to anticipate prod. churn Social network targeted marketing Post-disaster refugee reunification Sentiment analysis of
patterns, a correlation algorithm could be developed to reverse engineer approximate values for these indicators, in order to estimate
for algorithms that can understand the data shape while also providing analysts with some understanding of what the curation is doing to
is a computer science concept that refers to the fact that the veracity of the output of any
be removed, using decision-tree algorithms or other techniques. However, data cleaning itself is a subjective process (for example,
the famous Google pagerank algorithm has spawned an entire industry of organizations that claim to enhance website page rankings, and
the robustness of the original algorithm. For example, the enthusiasm surrounding GFT may well have created rebound effects, with more
algorithms and provide training data for their algorithms to reverse engineer approximate survey maps. Official statistics will thus continue
to be important to building the big data models and for periodic benchmarking so that the models can be tuned fine to reflect ground
algorithms and software techniques that can be repurposed for business-use cases. Indeed, where the applications of data use for development
A Faster Algorithm for Betweenness Centrality, Journal of Mathematical Sociology 25 (2): 163-177 Clauset, A. et al.
A two-stage clustering algorithm with robust recovery characteristics. Educational and Psychological Measurement 40,755 -759
A two-stage clustering algorithm with robust recovery characteristics. Educational and Psychological Mea -surement 40, 755â 759
A two-stage clustering algorithm with robust recovery characteristics. Educational and Psychological Mea -surement 40, 755â 759
scientists in computer science, it shows that these conditions were met only in the US academic system
1, 010 scientists in computer science worldwide Finally, we illustrate some policy implications of these findings and draw conclusions
of computer science were conceived by European thinkers (Alan Turing and John Von neumann) the evolution of the field in the half-century after WWII
Table 1. Origins of most important ideas in computer science and technology Top ten ideas in computer science
1. Turing machine (Goldstine and Von neumann; Turing 2. Programming languages; formal description of syntax and semantics;
9. Efficient algorithms; data structure (Knuth and Tarjan 10. Artificial intelligence Source: our elaboration from expert opinion
Luckily, computer science and the computer in -dustry have been the object of a massive historical literature, that has highlighted several key factors
courses in computer science across US universities Meanwhile, US universities started to be involved in research on the component technologies underly
in computer science, while Bauer was the first to propose the stack method of expression evaluation
that the institutionalization of computer science as an academic discipline took place earlier in the USA, approximately in the 1950s, than in Europe
the search regime of computer science In a stream of recent papers (Bonaccorsi, 2007 2008; 2010;
characterize the history of computer science from the point of view of the underlying abstract dynam -ics of knowledge
computer science, with a collective introduction NRC, 2004. The opening description sets the stage for our discussion
Computer science embraces questions ranging from the properties of electronic devices to the character of human understanding, from indi
Computer science encompasses basic research that seeks fundamental under -standing of computational phenomena, as well as applied research.
from experimental physics, in computer science there is a significant overlap. Great theorists also en -gage in developing
computer science research (NRC, 2004: 15 â involves symbols and their manipulation and the creation and manipulation of abstractions
â creates and studies algorithms and artificial constructs, notably unlimited by physical laws â exploits and addresses exponential growth
computer science has been characterized by turbulent We conclude that the search regime of computer science has been characterized by a turbulent rate of
growth, proliferation dynamics, and strong cognitive and institutional complementarity European competitiveness: IT and long-term scientific performance
into computer science, creating powerful forms of cognitive complementarity. Not only mathematics logics, and electric and electronic engineering have
been involved into computer science since the be -ginning, but also biology and chemistry (bioinfor -matics), earth sciences (geographic information
the relationship with computer science. In all cases there was not just â applicationâ, but, as noted above
In computer science this complementarity comes from the constitutive in -terplay between theoretical work and pragmatic
computer science An analysis of the CVS of top computer scientists An interesting perspective is to look at the large
computer science are recorded automatically by Citeseer, 2 a highly structured indexing system estab -lished in 1997 and endorsed by most scientific socie
-ties and departments in computer science worldwide The Citeseer service ranks scientists by the total number of citations, without checking for homo
computer science, irrespective of their age. Their av -erage age is 56 years, with a minimum of 30 years
rank high in the computer science field without a Phd from either the USA or Europe, with the USA
computer science and information technology, US Table 2. Distribution of degrees of top computer scientists by geographical area Area Phd degree Master degree Bachelor degree
the computer science field without a Phd from either the USA or Europe with the USA leading by a large
Table 3. Distribution of year and place of Phd degree of top scientists in computer science
Table 4. Ranking of top 15 universities granting Phd, Master and Bachelor degrees to top scientists in computer science
-dents considering a career in computer science. In this list the Indian Institute of technology ranks se -cond, contributing with 34 undergraduate students to
for a career in computer science is worldwide. En -try points are good universities offering strong
computer science is not globally competitive. If it were competitive we would see more students mi
key leaders in computer science Not surprisingly, computer science is number one at the level of Master degrees, a stage in which some
focusing is required. Still, it covers only 34.1%of observable cases (including missing observations Finally, at the Phd stage the disciplinary affiliation
of computer science dominates with 38.2%of cases The large number of missing observations may con
Phd is in computer science At the same time an interesting tentative interpre -tation can be offered. Computer science is a relative
-ly young discipline. It has not the long scientific history of physics, mathematics, or chemistry
%Computer science 327 38.2 156 34.1 102 15.9 Engineering 116 13.6 113 24.7 165 25.7 Mathematics 90 10.5 75 16.4 165 25.7
expertise with advanced computer science This interpretation is confirmed by Table 6, which shows the transition matrix between the Bachelor
We therefore conclude that computer science is a field characterized by a high degree of disciplinary mobility, attracting competences from related fields
Computer science-2. 0 2 79.4 81 15.7 16 15.7 3 2. 9 102 100.0 Total 51 19.7 85 50.9 220 14.8 64 14.8 12 2. 8 432 100.0
The search regime of computer science has been characterized by a turbulent rate of growth, proliferation dynamics and strong cognitive and institutional
-ered important in the computer science community and do not include many top conferences, that are
of the search regime in computer science Discussion of findings and policy implications The hidden dimension of industrial competitiveness
-ent disciplines around computer science, enjoy a rapid career, have extensive industry involvement as witnessed by research collaborations, as well as
Computer science has been based on a fierce competition for students and researchers worldwide Knowing how severe these demands are, top class
-covered in the computer science is becoming widespread (Wildavsky, 2010. This will continue to put pressure on European higher education systems
The search regime in computer science is based on a massive and fast effort of exploration of
Computer science. Reflections on the Field, Reflections from the Field. WASHINGTON DC National Academies Press Nicoletti, G and S Scarpetta 2003.
escaped from the lab. In Computer science. Reflections on the Field, Reflections from the Field, National Research Council
Computer science. Reflections on the Field, Reflections from the Field, National Research Council (ed.),pp 151â 158
Engineering and Computer science at MIT, 1882â 1982 Cambridge, MA: MIT Press Williams, M R 2000 A preview of things to come:
In Foundations of Computer science. Potential -Theory-Cognition, C Freksa, M Jantzen and R Valk (eds
assistive ICT, Computer science and artificial intelligence Engineering and Technology Electrical and electronic engineering, nanotechnology, materials (specifically
sciences, mathematics, computer science, food science, agriculture, and medical and veterinary sciences. A favorable geographic location, a largely pristine natural environment and unexploited
particularly strong in natural sciences, mathematics, computer science, food engineering, agriculture medical and veterinary sciences. Figure 6 confirms that the educational attainment of the regionâ s
mathematics, computer science food engineering, agriculture, as well as medical and veterinary sciences Important signs of entrepreneurial
mathematics and computer science which are areas of strength of the local universities, while enjoying the
the second type is built from a statistical algorithm for analysis of spatial agglomeration named LISA (i e.
Lecture Notes in Computer science 2362, Springer-verlag Berlin Heidelberg, 101-109 Granovetter, M.,(1976. âoenetwork sampling:
Notes in Computer science, 1765, Springer-verlag Kavassalis, P.,Lelis, S.,Rafea, M. & Haridi, S. 2004.
in Computer science and Engineering from University of Louisville. His research interests are in the fields of data/text mining, business process simulation, software agent applications, and
business innovations and received his MS degree in Computer sciences from University of Missouri at Rolla
and A m. S. in Computer science from Fairleigh Dickinson University. He has published various articles in academic book chapters, journals, and
University of South Florida and his MBA (Finance) and MS (Computer science) from Illinois State university. His research interests include User Resistance, ERP implementations, IT
< Back - Next >
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011