dc.contributor.author |
Metaxiotis, KS |
en |
dc.contributor.author |
Psarras, JE |
en |
dc.contributor.author |
Askounis, D |
en |
dc.date.accessioned |
2014-03-01T01:16:12Z |
|
dc.date.available |
2014-03-01T01:16:12Z |
|
dc.date.issued |
2001 |
en |
dc.identifier.issn |
09685227 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/13974 |
|
dc.subject |
Information systems |
en |
dc.subject |
Production |
en |
dc.subject |
Scheduling |
en |
dc.subject.other |
Problem solving |
en |
dc.subject.other |
Production control |
en |
dc.subject.other |
Real time systems |
en |
dc.subject.other |
Scheduling |
en |
dc.subject.other |
Production scheduling |
en |
dc.subject.other |
Information technology |
en |
dc.title |
Building ontologies for production scheduling systems: Towards a unified methodology |
en |
heal.type |
journalArticle |
en |
heal.identifier.primary |
10.1108/09685220110366803 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1108/09685220110366803 |
en |
heal.publicationDate |
2001 |
en |
heal.abstract |
In this paper we consider the use of ontologies as the basis for structuring and simplifying the process of constructing real-time problem-solving tools, focusing specifically on the task of production scheduling. In spite of the commonality in production scheduling system requirements and design, different scheduling environments invariably present different challenges (e.g. different constraints, different objectives, different domain structure, etc.). The proposed methodology for building ontologies used for production scheduling systems represents a synthesis of extensive work in developing constraint-based scheduling models for a wide range of applications in manufacturing and production planning. Since the effective modeling is one of the most important and difficult steps in the development of reliable information systems, and taking into consideration the fact that the general problem of the production scheduling in the industries is very difficult and still unsolved, one can easily estimate the merit of this methodology. |
en |
heal.journalName |
Information Management and Computer Security |
en |
dc.identifier.doi |
10.1108/09685220110366803 |
en |
dc.identifier.volume |
9 |
en |
dc.identifier.issue |
1 |
en |
dc.identifier.spage |
44 |
en |
dc.identifier.epage |
50 |
en |