WWW.THESIS.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Thesis, documentation, books
 
<< HOME
CONTACTS



Pages:     | 1 | 2 || 4 | 5 |   ...   | 14 |

«Masterstudium Business Informatics an der Technischen Universität Wien Studienplan 2011 in der Fassung vom Juni 2013 Gültig ab 1. Oktober 2013 ...»

-- [ Page 3 ] --

SBI/EC2 - Web: Analysis and Search (6.0 Ects) This module deals with the World Wide Web in terms of analysis of usage and structure of the search for Web-based information. The formal basis and methods of network theory are provided. This knowledge is then applied with the help of special tools and social network analysis software. Principles of information description and search technologies are described in the context of the World Wide Web. Current trends in personalisation and recommendation are illustrated.

The module provides the participants with an understanding of network analysis, machine learning for Web data analysis, understanding of functionality and improvement of Web search techniques, and a discussion of current research topics in Web Science and Web Search. The didactic concept of this module comprises lectures, group discussions, project work, and project presentations.

SBI/KM1 - Knowledge Management (6.0 Ects) This module deals with the management of implicit and explicit knowledge in enterprizes and other organizations. It considers organizational, cultural, strategic, and operational issues of knowledge management. The module covers strategic as well as operational knowledge management methods and tools. Students learn how to analyze, design, operate, and control the required knowledge in an organization.

SBI/KM2 - Information Extraction and Integration (6.0 Ects) This module deals with data extraction from the Web and integration of Web data into applications and processes. It comprises an overview about information extraction in general and covers in particular methods of Web querying and wrapper generation, as well as presenting wrapper languages, deep Web navigation traversal methods, and inductive, automated, and supervised approaches. Data extraction based on visual rendition, questions about robustness and adaptation, and further algorithmical and technical aspects are covered.

Furthermore, a special focus of this module is how Web extraction and integration topics are addressed by state-of-the-art libraries, tools, and frameworks and used in real-life scenarios. Special emphasis is given to Web data cleansing, integration of Web data into competitive intelligence scenarios, mashups, web application testing, web process integration, and using extraction and document understanding technologies for enabling web accessibility. The course comprises both a lecture and an exercise part. The lecture part is primarily intended to teach about methodologies as well as to illustrate concepts from practice including system live demonstrations. The goal of the exercises is to strengthen the knowledge of the participants, especially including practical usage of tools in the area of web data extraction.

SBI/KM3 - Semantic Web (6.0 Ects) The goal of this module is to introduce Semantic Web vision and basic understanding of Semantic Web technologies. The Semantic Web supports extensive possibilities for automated interrelation and query of information and processes. In this context Ontology as the building block of Semantic Web will be introduced and some important properties of ontologies will be discussed. It will be also shown how ontologies can support varied applications in dierent knowledge domains. This module also introduces some emerging trends in ontologies and Semantic Web eld, such as Linked Open Data. Furthermore, Based on the standard formats and languages such as XML, RDF(S) and OWL, some technologies and tools are presented that facilitate semi-automatic integration of various data sources. In this module mapping algorithms and interfaces for semi-automatic alignment of data, based on recent research results will be introduced.

SBI/KM4 - Semantic Business Processes (6.0 Ects) Service oriented techniques are used for building software applications that use services available in a network such as the World Wide Web. The driving forces come from both the software engineering community and the business process community. Service-Oriented Architecture (SOA) promotes loose coupling between software components so that interoperability across programming languages and platforms can be achieved. Extending the classic middleware functions, SOA techniques incorporate the demands of e-business by adding process modeling and management functions. The description of services covers not only software interfaces but also semantic business information. Services can be dynamically discovered and composite services can be built from aggregates of other services.

SBI/LAW - Advanced Aspects of IT-Law (6.0 Ects) This module deals with advanced legal aspects in applied computer sciences and IT related project and contract issues.

Students adopt a deeper and applied understanding of specic law sectors relevant for IT professionals in actual project scenarios. Students identify the specic relevance of certain legal issues in applied IT scenarios. Moreover students gain insight into everyday situations and are aware of the rights and duties of the parties involved, so that they may avoid legal drawbacks from the perspective of an IT professional. The majority of the lessons are held as presentations and discussions involving students. Moreover small practical exercises are elaborated by each student or in groups.

SBI/MO2 - e-Business Modeling (6.0 Ects) This module focuses on model-driven development of solutions for e-business partnerships. Thereby, the module investigates on methodologies and techniques on the dierent levels of an e-business partnership and the integration of these levels: (1) the value perspective manifested by a business model, (2) the process ow perspective manifested by choreographies among the parties, and (3) the execution perspective manifested by the deployment artifacts. A lecture series is accompanied by practical courses where the students have to demonstrate their skills by presenting solutions for given examples and develop a model-driven solution for a practical problem spanning all the dierent layers of inter-organizational systems for e-business.





SBI/MTE - Business Informatics: Methods and Techniques for e-Marketing (6.0 Ects) This module focuses on the technological as well as methodological aspects of the marketing of products and services over the Internet - often referred to as emarketing. Thereby, the scope of this module includes customer relationship management, advertising on the Web, aliate marketing, search engine marketing and optimization, as well as digital customer data. Furthermore, it takes into account how the Web 2.0 and its technological manifestations such as (micro) blogs, feeds, and social networks, have changed the marketing activities of enterprises. Beside the discussion of the above mentioned topics, the lecture series will also critically reect the signicance of the advertising industry on startups, innovation, and IT in general in recent years. In practical courses, students will design e-marketing strategies and learn how to employ contemporary e-marketing methods and techniques.

SIT/DPR - Digital Preservation (6.0 Ects) The module aims to develop in participants an appreciation of the issues surrounding digital preservation within the context of infromation systems, business processes, scientic data management, security, and software development. Participants should leave with a coherent and practical understanding of activities surrounding digital preservation and, in particular, a developed understanding of selection and appraisal, workow modeling, metadata denition, ingest process management, and a working knowledge of the issues surrounding audit and certication of digital repositories. The module raises awareness of sustainability issues and builds sustainability into the process of software development. Moreover, security issues are elaborated in terms of data and software security with respect to long term preservation. The participants of this module are encouraged to put their theoretical knowledge into practice implementing solutions for selected preservation issues.

SIT/DS1 - Internet Computing (6.0 Ects) This module provides technical knowledge of software architecture for and implementation of state-of-the-art distributed enterprize systems, specically internet-based ones. The module consists of two separated parts. Software Architecture focuses on design-time choices for building distributed and internet-based systems. It covers architectural patterns, approaches to modeling and documenting software architecture, and novel approaches in the eld such as model-driven architectures. Advanced Internet Computing is more geared towards systems based on the notion of service-oriented architecture, and provides technical knowledge for implementing advanced internet-based systems. Both parts are held as VUs, with written exams covering the lecture parts and practical assignments for the lab parts. Assignments are done in small groups.

SIT/DS2 - Technologies for Distributed Systems (6.0 Ects) This module provides detailed knowledge of various middleware technologies for implementing state-of-theart distributed systems. The module covers middleware for the data tier (e.g., objectrelational mapping technology), the business logics tier (e.g., distributed objects, Web services and messaging technology), and the presentation tier. The module is centered on practical and implementation-level issues. The module consists of a single VL. The lecture part of the module covers more general and background information, and is graded using a written exam. The lab part of the module consists of assignments, which are done alone (no group work). Grading for the lab part is based on the assignments and the student's contributions in periodic review lessons. Review lessons are held for

groups of 24 students.

SIT/DS3 - Networking (6.0 Ects) This module covers important topics of advanced networking, such as design, implementation, maintenance and management. Furthermore, issues of mobile and pervasive computing are covered and set in relation to the knowledge acquired in networking. This module aims at providing a lower-level view on the topics covered in the modules SPT/DS1 and SPT/DS2, but is fundamentally independent. The module consists of three parts. Advanced networking is covered in a lecture and a separate practical lab. The lecture is held in an interactive way, student contributions are expected and required. The lecture is graded using an oral exam. The lab is held as group work and graded in groups. Students are suggested to take the lecture and lab exercise in parallel. Pervasive and mobile computing is taught in an independent VL.

SIT/EUP End User Programming (6.0 Ects) This module deals with issues of End User Programming (EUP) / End User Development (EUD) - i.e. how persons without professional programming background and/or without professional programming goals develop software (e.g., by developing large and complex spreadsheet programs). There exist rather diverse and large groups of such developers. The focus of this module is on professionals of other disciplines that develop software in their own business context.

Students who have successfully passed this module have a profound understanding of important aspects of end user programming and are able to asses and improve software frameworks for end user programming perspective.

SIT/IRV Advanced Information Retrieval & Visualization (6.0 Ects) This module teaches methods, concepts, and techniques of Information Retrieval (IR) as well as Information Visualization (InfoVis) and Visual Analytics (VA) to deal with the problem of information overload. Information Retrieval enables managing large collections of unstructured text and multimedia content (such as typically found in digital libraries and the web) and extracting selective content relevant to users' current information needs.

With ever-growing information repositories, fast and scalable retrieval systems are key in helping people to complete their information tasks eciently. Visualization can help to make sense of data (potentially returned by an IR engine), explore complex information spaces or spot patterns and relationships by taking advantage of the powerful human perceptual system that is extremely ecient in processing visual input,. Information Visualization is an interdisciplinary eld of research that is concerned with interactive visualizations of mainly

Abstract

data and has its roots primarily in computer science.

Interactivity or the possibility to engage in an active discourse with the representation lies at the core of Information Visualization. Visual Analytics extends InfoVis by integrating automated analysis methods (e.g., statistics, data mining, machine learning) and focusing on analytical reasoning supported by interactive visual interfaces.

SIT/MO1 - Advanced Model Engineering (6.0 Ects) This module tackles the problem of model evolution in general, and model versioning in particular. Students who have successfully passed this module have a profound understanding of all aspects of model versioning, and may be able to apply technology at hand to model versioning

tasks.

SIT/SC1 - Secure Software Development and Organizational Aspects (6.0 Ects) This module deals with advanced concepts of information security. Students will learn about managing software development projects so that secure software can be developed (secure software development life cycle) and organizational aspects of security, including information security audits, business continuity management, and data leakage prevention. Theoretical background will be presented in lectures and through e-learning. Students will work in groups on small projects and case studies. After completing this module students will have a stronger knowledge to assess, design, and build secure (software) systems.

SIT/SC3 - Secure Systems Engineering (6.0 Ects) IT security engineering has become a critical element of the overall performance of IT systems and IT projects. Enhancing eective functional engineering by thorough security models, processes, and techniques is a major design and architecture issue in several application elds. In the lectures of this module students will learn advanced aspects of how to engineer secure systems and how to maintain security standards in large and complex IT infrastructures.



Pages:     | 1 | 2 || 4 | 5 |   ...   | 14 |


Similar works:

«60 GHz Transceiver Circuits in SiGe-HBT and CMOS Technologies vorgelegt von Master of Science Amin Hamidian Von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften Dr.-Ing. genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr.-Ing. Clemens Gühmann Gutachter: Prof. Dr.-Ing. Georg Böck Gutachter: Prof. Dr.-Ing. Arne Jacob Tag der wissenschaftlichen Aussprache: 10. Dezember...»

«Excitation of Phonons in Solids and Nanostructures by Intense Laser and XUV Pulses and by Low Energy Atomic Collision submitted by NAIRA GRIGORYAN Dissertation to fulfill the requirements for the doctoral degree Doktor der Naturwissenschaften (Dr. rer. nat.) Supervisor: Prof. Dr. MARTIN E. GARCIA Co-supervisor: Dr. EEUWE S. ZIJLSTRA Department of Theoretical Physics II Faculty of Mathematics and Natural Sciences University of Kassel, Germany Date of defense: 27th October 2015 Prof. Dr. MARTIN...»

«Journal of Universal Computer Science, vol. 7, no. 5 (2001), 410-419 submitted: 14/4/01, accepted: 18/5/01, appeared: 28/5/01  Springer Pub. Co. Issues in Compiling Gerhard Goos (Fakult¨t f¨r Informatik au Universit¨t Karlsruhe, Germany a ggoos@informatik.uni-karlsruhe.de) Hermann Maurer on occasion of his 60th birthday Abstract: We consider the state of the art in compiler construction and where to go from here. Main topics are improved exploitation of present (and future) hardware...»

«Brooks, B.E., and Beckermann, C., “Prediction of Burn-on and Mold Penetration in Steel Casting Using Simulation,” in Proceedings of the 60th SFSA Technical and Operating Conference, Paper No. 5.3, Steel Founders' Society of America, Chicago, IL, 2006. PREDICTION OF BURN-ON AND MOLD PENETRATION IN STEEL CASTING USING SIMULATION Brandon E. Brooks1 and Christoph Beckermann2 Graduate Research Assistant and 2Professor, Department of Mechanical and Industrial Engineering, The University of Iowa,...»

«The Pilates ABC’s Ton Voogt and Michael Fritzke Copyright 2008, 2010, 2013 by Ton Voogt and Michael Fritzke. All rights reserved. No part of this publication may be reproduced, translated, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying or otherwise, without the prior written permission of the copyright owners. TRIADBALL™ is registered trademark of ZENIRGY, LLC. “Pilates is not a system of haphazard exercises designed to...»

«NATIONAL PREVENTIVE MECHANISMS: Monitoring the forced deportation flights of migrants OPCAT Briefings March 2012 Introduction In the last years, there have been several cases of detainees dying prior to their forced deportation 1 (such as a Nigerian detainee in March 2010 at Zurich airport2) or during the deportation itself (such as Jimmy Mubenga who died on a deportation flight from the UK in December 2010 3 ). Forced deportation is a moment where detainees are particularly vulnerable and...»

«(oQ Q7c LINVENTORY OF RESEARCH ON AUTOMATION AND MANPOWER PROBLEMS IN CALIFORNIA Lewis J. Perl Prepared for the California Commission on Manpower, Automation, and Technology COMMAT 654 Institute of Industrial Relations,,, University of California Berkeley August, 1965 YRidIAL XNTi, vJ'' -1 '! C ~~~~~K. 4., I, Li Il8v..Ty r?tw a9, TABLE OF CONTENTS Page Introduction 1 Studies of Changes in Labor Supply and Demand in the I. Face of Technological Change 3 Retraining Problems Resulting from...»

«Netzstabilität bei Überfrequenz Handlungsempfehlung im Rahmen der Verordnung zur Gewährleistung der technischen Sicherheit und Systemstabilität des Elektrizitätsversorgungsnetzes (Systemstabilitätsverordnung SysStabV) SUNNY BOY SUNNY MINI CENTRAL SUNNY TRIPOWER Technische Beschreibung SysStabV-TB-de-15 | Version 1.5 DE SMA Solar Technology AG Inhaltsverzeichnis Inhaltsverzeichnis 1 Hinweise zu dieser Anleitung....................... 5 1.1 Gültigkeitsbereich.......»

«An Analysis of Stress Concentration in Compound Fillets Produced During Dimensional Restoration Repair of Jet Engine Components by Steven Dallas Townes Jr. A Project Submitted to the Graduate Faculty of Rensselaer Polytechnic Institute in Partial Fulfillment of the Requirements for the degree of MASTER OF ENGINEERING IN MECHANICAL ENGINEERING Approved: _ Ernesto Gutierrez-Miravete, Project Adviser Rensselaer Polytechnic Institute Hartford, CT December 18, 2009 © Copyright 2009 by Steven Townes...»

«Tenth International Water Technology Conference, IWTC10 2006, Alexandria, Egypt 655 TOWARDS SUSTAINABLE ENERGY IN SEAWATER DESALTING IN THE GULF AREA M. A. Darwisha, N. Al-Najema, and N. Liorb Mechanical Engineering Departments, aKuwait University, Kuwait and bUniversity of Pennsylvania, USA ABSTRACT Gulf countries, experienced very rapid growth in the last four decades by the evolution of oil production and its price increase. The main source of portable water, about 93%, was secured by...»

«FH JOANNEUM – University of Applied Sciences Physiogame: Leap Motion zur Bewegungstherapie Modulare Anwendungsentwicklung in JavaScript Diplomarbeit zur Erlangung des akademischen Grades eines „Diplomingenieurs für technisch-wissenschaftliche Berufe“ eingereicht am Master-Studiengang Informationsmanagement Verfasser: Mario Ranftl, BSc.Betreuer: Prof. DI Dr. Alexander Nischelwitzer Graz, 19. Dezember 2013 ! Eidesstattliche Erklärung Ich erkläre hiermit an Eides statt, dass ich die...»

«Competition, signaling and non–walking through the book: effects on order choice∗ Marcela Valenzuela† Ilknur Zer‡, August 2, 2012 Abstract We investigate the effects of competition and signaling in a pure order driven market and examine the trading patterns of agents when walking through the book is not allowed. We show that the price information does not matter for an impatient trader in her decision of fitting the order size under this market mechanism. Also, our results suggest...»





 
<<  HOME   |    CONTACTS
2016 www.thesis.xlibx.info - Thesis, documentation, books

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.