• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,910
Next 10 →

Table 1 A small project was initiated to select a user friendly rule engine which could be used by the business analysts to do initial routing of the policies based on frequently changing rules. The business analysts were actively involved with IT in the selection of a tool which they could use to accomplish initial assignment. Criteria for selecting the rule engine included: 1. Rule engine must be easy to use for both IT developer and business analyst. Since most of the rule changes are to be done by the business analyst, the business analyst user interface and ease of use took priority over IT ease of use and user interface.

in Abstract Integration of a Business Rules Engine to Manage Frequently Changing Workflow: A Case Study of Insurance Underwriting Workflow
by George K Royce

Table 3: List of data quality analyst job descriptions used in study.

in Proceedings of the Eighth International Conference on Information Quality (ICIQ-03) PURSUING A CAREER IN INFORMATION QUALITY: THE JOB OF THE DATA QUALITY ANALYST (Research-in-Progress)
by Elizabeth M. Pierce
"... In PAGE 4: ... 2.3 DQA Responsibilities Cited by Job Postings As shown in Table3 , the two most common DQA responsibilities cited by the majority of job postings involve activities dealing with resolving data quality problems and providing quality assurance oversight of data flows and stores. Typical phrasing for resolving data quality problems are words like quot;Assist in determining root cause of quality issues and recommending short term and long term solutions quot; (Bluebell, PA), quot;Investigate, trouble-shoot, and document source-to-target and other data issues from internal and external customers quot; (DataQuick), and quot;Evaluate current quality control processes and make recommendations for process improvements quot; (IRI).... In PAGE 5: ... 2 Job Postings (E, K) 8. Ensure enforcement of organization apos;s data privacy policy 1 Job Posting (V) * No specific responsibilities cited in job posting 2 Job Postings (B, Q) Table3 : DQA Responsibilities Cited by Job Postings 161... ..."

Table 3. Human analysts.

in Systems Studied
by The Reference Components, Lines Of
"... In PAGE 2: ...1 Reference Components for Aero, Bash, and CVS We asked five software engineers to identify atomic components in Aero, Bash, and CVS. Table3 summarizes their experience and how the task was divided among them. There was no overlap of their work.... ..."

Table 3. Human Analysts.

in A Comparison of Abstract Data Type and Objects Recovery Techniques
by Jean-François Girard, Rainer Koschke
"... In PAGE 5: ... The systems were completely unknown to them. Table3 summarizes their experience and how the task was divided among them. There was no overlap of their work.... ..."

Table 3. Human Analysts.

in Computer Society. Comparison of Abstract Data Type and Abstract State Encapsulation Detection Techniques for Architectural Understanding
by Jean-françois Girard
"... In PAGE 5: ... The systems were completely unknown to them. Table3 summarizes their experience and how the task was divided among them. There was no overlap of their work.... ..."

Table 3: Analyst Profile Matrix

in UNDERSTANDING ANALYST EFFECTIVENESS IN REQUIREMENTS ELICITATION: A GESTALT FIT PERSPECTIVE
by unknown authors
"... In PAGE 9: ... If we consider that an organization has the following analysts {A1, A2, A3, A4, A5, A6}, then after performing step1 the organization should have the following matrix provided in Table 3. Each cell in Table3 has the following information: First, there is the name of the set of business analysts that satisfy the analyst capability dimension and the value corresponding to the cell. The nomenclature convention for each of these sets is as follows - for example BKH denotes the set of analysts with high business knowledge, BKM refers to the set of analysts with medium business knowledge and BKL the set of analysts with low business knowledge.... ..."

TABLE !tr- $ENSITIVITY ANALYStS: CRUDE QIL SUPPLY ELASTICITY

in Commissioner
by Keith B. Anderson, Michael R. Metzger, Keith B. Anderson, M~hael R. Metzger, Janet Steiger, Mar Y L. Azcuen Aga, Andrew J. Strenio, Deborah K. Owen, Roscoe B. St, Arek Iii, John L. Peterman, Ronald S. Bond, James A. Langenfeld, Paul A. P A Utler, Denis A. Breen, Rober T D. Brogan, Gerard R. Butters, Timothy P. Daniel, Burea U Of Economics 1991

TABLE 1 THE USER - ANALYST RELATIONSHIP

in 1. Introduction to Chapter Chapter 1 Introductions, Issues, and Terminology
by unknown authors

Table 5 Policies that Support Employment for Mothers: Index Values and Ranks

in Supporting the Employment of Mothers: Policy Variation Across Fourteen Welfare States
by Janet Gornick Department, Janet C. Gornick, Marcia K. Meyers, Katherin E. Ross
"... In PAGE 27: ... Policies Aimed at Children Under Age Six. Figure 1 uses the first index to compare the intensity of government support for employment among mothers with children under the age of six; index values are reported in Table5 . Three loose clusters are revealed.... In PAGE 42: ... For more information, see LIS Working Paper #7 (d e Tombeur 1995). 7 E xpenditures data a re adapted from Table5 in Kamerman and Kahn apos;s Government Expenditures for Childr en and Their Families in Advanced Industrialized Countries, 1960-1985 (1991b). Thes e e xpenditure data were converted b y OECD analysts into 1980 United States dollars using purchasing power parities.... ..."

Table 2 Proposed policies for Sri Ram Sagar Project

in Abstract
by unknown authors
"... In PAGE 6: ... The number of generated non- dominated alternatives are reduced to a chosen few, based on consultations between the analyst (first author) and the decision maker. Thirty-seven policies labelled P01 to P37 are adopted after such consultations and are shown in Table2 . It is observed that with the increase of labour employ- ment and the decrease of agricultural production, the net benefits gradually increased to a maximum level (policy P26) and then decreased.... In PAGE 9: ...1.3722 1.3810)2]=0.0000863. The policy that gives the minimum total square error value is chosen as the representative policy for that group. The policies P04, P11, P17, P23, P29 and P34 of Table2 having minimum total square error values of 0.... In PAGE 10: ..., 1986). In EXPROM-2, parameters are based on PROMETHEE-2, ideal and anti ideal values ( Table2 ) from the existing alter- natives. Table 5 presents the multicriterion pref- erence index values and +(a), (a), (a), ranking pattern corresponds to PROMETHEE-2.... In PAGE 12: ...XPROM-2 varies between 0.85 to 0.95. Considering the cases of equal and varying weightages together with extensive sensitivity analysis studies, it is concluded that alternative policy G5 referring to policy P29 of Table2 is the most suitable one for further investigation and implementation. Next best is found to be G4 (P23).... ..."
Next 10 →
Results 1 - 10 of 5,910
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University