Issue 3 • May 2008
Table of contentsPublication Year: 2008, Page(s): C1| |PDF (39 KB)
IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews publication informationPublication Year: 2008, Page(s): C2| |PDF (38 KB)
Guest Editorial Foreword to the Special Issue on Enterprise Services Computing and Industrial ApplicationsPublication Year: 2008, Page(s):277 - 279
The two review papers and four regular papers in this special issue focus on enterprise computing and industrial applications. View full abstract»
Unleashing the Effectiveness of Process-Oriented Information Systems: Problem Analysis, Critical Success Factors, and ImplicationsPublication Year: 2008, Page(s):280 - 291
Cited by: Papers (46)
Process-oriented information systems (IS) aim at the computerized support of business processes. So far, contemporary IS have often fail to meet this goal. To better understand this drawback, to systematically identify its rationales, and to derive critical success factors for business process support, we conducted three empirical studies: an exploratory case study in the automotive domain, an onl... View full abstract»
Cited by: Papers (15) | Patents (1)
The paper proposes an approach to content dissemination that exploits the structural properties of an Extensible Markup Language (XML) document object model in order to provide an efficient dissemination and at the same time assuring content integrity and confidentiality. Our approach is based on the notion of encrypted postorder numbers that support the integrity and confidentiality requirements ... View full abstract»
Cited by: Papers (14)
A service-oriented system is a collection of independent services that interact with one another through message exchanges. Languages such as the Web Services Description Language (WSDL) and the Business Process Execution Language (BPEL) allow developers to capture the interactions in which an individual service can engage, both from a structural and from a behavioral perspective. However, in larg... View full abstract»
Cited by: Papers (12)
Workflow technologies are becoming pervasive in that they enable the execution of business processes in distributed and ubiquitous computing environments. As long-running transactions, the execution of workflows in environments without dedicated infrastructures raises transactional requirements due to the dynamicity of resources available to run a workflow instance and the integration of relaxed a... View full abstract»
An Impregnable Lightweight Device Discovery (ILDD) Model for the Pervasive Computing Environment of Enterprise ApplicationsPublication Year: 2008, Page(s):334 - 346
Cited by: Papers (2)
The worldwide use of handheld devices (personal digital assistants, cell phones, etc.) with wireless connectivity will reach 2.6 billion units this year and 4 billion by 2010. More specifically, these handheld devices have become an integral part of industrial applications. These devices form pervasive ad hoc wireless networks that aide in industry applications. However, pervasive computing is sus... View full abstract»
Cited by: Papers (14)
The analysis of workflows in terms of structural correctness is important for ensuring the quality of workflow models. Typically, this analysis is only one step in a larger development process, followed by further transformation steps that lead from high-level models to more refined models until the workflow can finally be deployed on the underlying workflow engine of the production system. For pr... View full abstract»
Cited by: Papers (26) | Patents (12)
The explosion in recent interest in radio-frequency identification (RFID) tags stems primarily from advances in information processing in supply chain management. Given their processing power and memory capabilities, RFID tags can be used in a wide range of applications including those where barcodes can and cannot be used. Although the potential exists, it is hampered by the relatively high unit ... View full abstract»
Cited by: Papers (43)
Role-based approaches are emerging technologies in information system design and implementation. Roles have been acknowledged and applied in many fields for many years. Considering their increasing importance and applications in the development of various information systems, this paper intends to: 1) survey the literature relevant to role mechanisms and role-based systems in different fields and ... View full abstract»
Cited by: Papers (112)
Machine learning is inherently a multiobjective task. Traditionally, however, either only one of the objectives is adopted as the cost function or multiple objectives are aggregated to a scalar cost function. This can be mainly attributed to the fact that most conventional learning algorithms can only deal with a scalar cost function. Over the last decade, efforts on solving machine learning probl... View full abstract»
Cited by: Papers (99) | Patents (17)
There is much video available today. To help viewers find video of interest, work has begun on methods of automatic video classification. In this paper, we survey the video classification literature. We find that features are drawn from three modalities - text, audio, and visual - and that a large variety of combinations of features and classification have been explored. We describe the general fe... View full abstract»
Computer Tool With a Code Generator for Avionic Distributed Fuel Control Systems With Smart Sensors and ActuatorsPublication Year: 2008, Page(s):431 - 445
Cited by: Papers (9)
This paper describes the development of a graphic computer tool that facilitates the generation of control software for a new distributed fuel management system for aircraft. The system has been the result of a three-year European Community Research Project. The goal was to move from a centralized control architecture to a fully distributed one, where each component of the system makes a decision ... View full abstract»
Cited by: Papers (11)
In this paper, we investigate the value of knowledge [V(K)] in a service organization where knowledge is strictly uncodified and used as a supplement to data and information in the decision logic in a service parts replenishment problem. An earlier case study by the authors has revealed that automotive service parts managers often have considerable knowledge about special supply chain events that ... View full abstract»
IEEE Systems, Man, and Cybernetics Society InformationPublication Year: 2008, Page(s): C3| |PDF (28 KB)
IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews Information for authorsPublication Year: 2008, Page(s): C4| |PDF (36 KB)
Aims & Scope
This Transactions ceased production in 2012. The current retitled publication is IEEE Transactions on Human-Machine Systems.
Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence.
Authors should submit human-machine systems papers to the IEEE Transactions on Human-Machine Systems.
Authors should submit systems engineering papers to the IEEE Transactions on Systems, Man and Cybernetics: Systems.
Authors should submit cybernetics papers to the IEEE Transactions on Cybernetics.
Authors should submit social system papers to the IEEE Transactions on Computational Social Systems.
Meet Our Editors
Dr. Vladimir Marik
(until 31 December 2012)