2016 IEEE 18th Conference on Business Informatics (CBI)

Aug. 29 2016-Sept. 1 2016

Go

Filter Results

Displaying Results 1 - 25 of 32
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | |PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | |PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - vii
    Request permission for commercial reuse | |PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2016, Page(s): viii
    Request permission for commercial reuse | |PDF file iconPDF (120 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome Message from the CBI 2016 General Co-Chair

    Publication Year: 2016, Page(s): ix
    Request permission for commercial reuse | |PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • CBI 2016 Organizing Committee

    Publication Year: 2016, Page(s): x
    Request permission for commercial reuse | |PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • CBI 2016 Program Committee

    Publication Year: 2016, Page(s):xi - xiv
    Request permission for commercial reuse | |PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • ISAHealth 2016 Preface

    Publication Year: 2016, Page(s):xv - xvi
    Request permission for commercial reuse | |PDF file iconPDF (84 KB) | HTML iconHTML
    Freely Available from IEEE
  • ISAHealth 2016 Organizing Committee

    Publication Year: 2016, Page(s): xvii
    Request permission for commercial reuse | |PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • TEE 2016 Preface

    Publication Year: 2016, Page(s): xviii
    Request permission for commercial reuse | |PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • TEE 2016 Organizing Committee

    Publication Year: 2016, Page(s): xix
    Request permission for commercial reuse | |PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • W3SC 2016 Preface

    Publication Year: 2016, Page(s):xx - xxi
    Request permission for commercial reuse | |PDF file iconPDF (85 KB) | HTML iconHTML
    Freely Available from IEEE
  • W3SC 2016 Organizing Committee

    Publication Year: 2016, Page(s): xxii
    Request permission for commercial reuse | |PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Predicting Political Donations Using Twitter Hashtags and Character N-Grams

    Publication Year: 2016, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (292 KB) | HTML iconHTML

    We describe a novel approach for predicting politicaldonations and performing psychographic segmentation basedon social data linked to election donation records. The role ofmicroblogs in enterprise informatics, specifically in relation tocustomer relationship systems is highlighted. Algorithms trainedon social data can be used to interpret and detect prospects' psychographicinformation. Contrasted... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business Process Elicitation from Regulatory Compliance Documents: An E-Government Case Study

    Publication Year: 2016, Page(s):8 - 13
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (905 KB) | HTML iconHTML

    There is an increase in the number of regulations, standards, legislations and other sources of compliance requirements, which enforce organizations to assess their business processes and make sure that they adhere to the constraints set forth. Following legislative and internal policy changes, every company has to refine its basic strategies in order to improve the quality of products and service... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software as a Service Production: An Operationalizable Domain Model

    Publication Year: 2016, Page(s):14 - 19
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (417 KB) | HTML iconHTML

    Competition among software as a service (SaaS) providers becomes more pressing as new players enter the market. In order to stand competition providers require more efficient production processes. Therefore, automation is key and standardized domain conceptualizations serve as a basis for automation. Existing conceptualizations of IT service production insufficiently connect the business layer, pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Innovative Applications and Services Based on Privacy Enhanced Distributed Computations on IoT Devices

    Publication Year: 2016, Page(s):20 - 25
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (300 KB) | HTML iconHTML

    Computational Intelligence methods are widely used in a diverse range of scientific and industrial applications, including economic modeling, finance, networks and transportation, database design, design and control, scheduling and others. On the other hand, Collective Intelligence methods aim at harvesting the power of people's mobile devices for gathering and sending useful information about the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conceptual Model for a Generic Resource Booking Management System

    Publication Year: 2016, Page(s):26 - 31
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (378 KB) | HTML iconHTML

    Booking, which is the act of reserving resources in advance, is an important component of the operations of organizations of all sizes, from enterprise-level businesses, to service-based small businesses. Several applications, known as Booking Management Systems (BMS), have been developed for managing this booking process. However, a common issue with most of these BMS's is that they are typically... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining Sonification and Visualization for the Analysis of Process Execution Data

    Publication Year: 2016, Page(s):32 - 37
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3465 KB) | HTML iconHTML

    Business process execution data is analyzed for different reasons such as process discovery, performance analysis, or anomaly detection. However, visualizations might suffer from a number of limitations. Sonification (the presentation of data using sound) has been proven to successfully enhance visualization in many domains. Although there exist approaches that apply sonification for real-time mon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Patients' Admissions in Intensive Care Units: A Clustering Overview

    Publication Year: 2016, Page(s):38 - 44
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (178 KB) | HTML iconHTML

    Intensive Care is one of the most critical areas ofmedicine. Its multidisciplinary nature makes it a very wide area, requiring all types of healthcare professionals. Given the criticalenvironment of intensive care units, it becomes evident the need touse technology of decision support systems to improve healthcareservices and Intensive Care Units management. By discovering thecommon characteristic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards of Automatically Detecting Brain Death Patterns through Text Mining

    Publication Year: 2016, Page(s):45 - 52
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (408 KB) | HTML iconHTML

    In the area of medicine, x-rays are very useful to check if the patient suffers from brain death. Their diagnosis is made using free text. This type of record difficult the process of making qualitative analysis in order to automatically detect possible brain problems. This project aims to make qualitatively and quantitatively analysis of Brain Computed Tomography (CT) diagnosis using text analysi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chest Breadths to Predict Individuals' Age - A Case Based View

    Publication Year: 2016, Page(s):53 - 60
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (740 KB) | HTML iconHTML

    It is well known that rib cage dimensions depend on the gender and vary with the age of the individual. Under this setting it is therefore possible to assume that a computational approach to the problem may be thought out and, consequently, this work will focus on the development of an Artificial Intelligence grounded decision support system to predict individual's age, based on such measurements.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Hepatic Steatosis Assessment through Liver Biopsy Image Processing

    Publication Year: 2016, Page(s):61 - 67
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (627 KB) | HTML iconHTML

    Hepatic steatosis is the abnormal fat accumulation in the hepatic cells and the liver. The lipids contain triglycerines and other kinds of molecules. Hepatic steatosis appears when there is some defect in the process, during which the free fatty acids are taken by the liver and exuded as lipoproteins. The main reasons which can cause steatosis is alcohol, obesity and diabetes mellitus. In many cas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Evolution Modeling under Conditions of Change in the Data Exchange Rate

    Publication Year: 2016, Page(s):68 - 71
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (165 KB) | HTML iconHTML

    The present paper is devoted to the research into the topical questions of network evolution modeling considering the constant changes in the data environment as well as the data exchange rate. A two-level approach to the network community analysis based on the division into macro-and micro-levels of monitoring is suggested. Functionality of both levels is described. Suggestions for investigation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.