:::

詳目顯示

回上一頁
題名:Enabling Intelligent Knowledge Authority Management for Collaborative Commerce Using Knowledge Keywords
書刊名:工業工程學刊
作者:侯建良楊士霆 引用關係
作者(外文):Hou, Jiang-liangYang, Shih-ting
出版日期:2004
卷期:21:5
頁次:頁453-464
主題關鍵詞:關鍵字結構文件管理知識管理文件權限Keyword ontologyDocument managementKnowledge managementDocument authority
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:6
  • 點閱點閱:26
     在產業協同合作環境下,智慧型文件/知識管理機制將可協助企業體有效管理複雜之產業知識、文件與交易資訊。如欲使知識庫或文件庫成為企業經營的重要資產,文件內容與權限管理為箇中一項要務。本論文以包含主要與次要關鍵字等內容之關鍵字結構表達知識文件的重要意涵,並以一套四階段法則有系統地根據關鍵字結構進行知識文件權限推論;文中並以一案例驗證本方法論之可行性。整體而言,此研究成果可提供知識工程師一套適用於協同合作架構之知識內容與權限管理技術。
     The intelligent document and knowledge management mechanism is required for efficient management over the sophisticated knowledge, documents and transaction information induced in the business collaboration environment. In order to establish the knowledge or document repository as an enterprise asset, one of the critical issues is the document content and authority management. In this paper, the key contents of a document are represented as the knowledge ontology consisting of major and minor keywords. Since a decision support approach for document authority determination is required to systematically determine knowledge accessibility, this paper proposes a four-phase reasoning approach for document authority management using keyword ontology. Authority of the target knowledge can be automatically determined on the basis of the keyword correlation with the existing documents. A demonstration case is also provided to illustrate feasibility of the approach. Generally, the approach can provide the knowledge engineer or administrator an applicable solution for efficient knowledge/document content and authority management under the collaborative commerce architecture.
期刊論文
1.孫銘聰、侯建良(20030700)。建構電子化知識文件之權限指派架構與模式。工業工程學刊,20(4),305-316。new window  延伸查詢new window
2.Loehr, L.(1995)。Composing in groups: The concept of authority in cross functional project team work。IEEE Transactions on Professional Communication,38(2),83-94。  new window
3.葉、吳冬生(2000)。Partial-encryption technique for intellectual property protection of FPGA-based products。IEEE Transactions on Consumer Electronics,46(1),183-190。  new window
會議論文
1.Chang, H. Y.、Narayan, R.、Wu, S. F.、Vetter, B. M.、Wang, X.、Brown, M.、Yuill, J. J.、Sargor, C.、Jou, F.、Gong, F.(1999)。DECIDUOUS: Decentralized source identification for network-based intrusions。沒有紀錄。701-714。  new window
2.邱瓊慧(2001)。The authority structure problem of computer supported collaborative concept mapping system for elementary students。沒有紀錄。57-60。  new window
3.Farkas, J.(1995)。Towards classifying full-text using recurrent neural networks。沒有紀錄。511-514。  new window
4.Fernandez, I. B.、Subbarao, W. V.(1994)。Encryption based security for ISDN communication: Technique and application。沒有紀錄。70-72。  new window
5.Hall, M. J. J.(1996)。A risk and control-oriented study of the practices of spreadsheet application developers。沒有紀錄。364-373。  new window
6.Hennig, A.、Marongiu, E.、Sherkat, N.、Whitrow, R. J.(1997)。DART - a software architecture for the creation of a distributed asynchronous recognition toolbox。沒有紀錄。439-443。  new window
7.黃世杰、黃慶連(1996)。Improvement of classification accuracy by using enhanced query-based learning neural networks。沒有紀錄。398-402。  new window
8.Karunadsa, P. S.、Annakkage, U. D.、MacDonald, B. A.(2000)。Dynamic security control using secure regions derived from a decision tree technique。沒有紀錄。1861-1865。  new window
9.Krulwich, B.(1995)。Learning document category descriptions through the extraction of semantically significant phrases。沒有紀錄。1-10。  new window
10.Lam, W.、Low, K. F.(1997)。Automatic document classification based on probabilistic reasoning: model and performance analysis。沒有紀錄。2719-2723。  new window
11.Lee, C. T.、Harris, J. W.(1996)。Designing a virtual access control configuration protocol for implementation over ISDN and shared-media networks。沒有紀錄。116-125。  new window
12.Leedham, G.、Tan, W. K.、Yap, W. L.(2001)。Handwritten country name identification using vector quantisation and hidden Markov model。沒有紀錄。685-688。  new window
13.李彪、戴開宇、張申生(2001)。Virtual certificate authority for virtual enterprises。沒有紀錄。222-224。  延伸查詢new window
14.Lin, Z.、Shi, W. X.、Wang, L.(2000)。A study and analysis on a high intensity public data encryption algorithm。沒有紀錄。2492-2494。  new window
15.Piattini, M.、Rodero, J. A.(1999)。Auditing data warehouse security。沒有紀錄。255-261。  new window
16.Sailer, R.(1998)。Security services in an open service environment。沒有紀錄。223-234。  new window
17.Schneck, P. A.、Schwan, K.(1998)。Dynamic authentication for high-performance networked applications。沒有紀錄。127-136。  new window
18.張玉芳、熊忠陽(2000)。A MIS security strategy based on client/ server architecture。沒有紀錄。676-677。  延伸查詢new window
圖書
1.Halliden, P. W.(1995)。Security for distributed applications。European Convention on Security and Detection。沒有紀錄。  new window
2.Parker, D. B.(1995)。Using threats to demonstrate the elements of information security。European Convention on Security and Detection。沒有紀錄。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top