Sciweavers

1986 search results - page 324 / 398
» An activity based costing approach to systems development an...
Sort
View
EDBT
2004
ACM
94views Database» more  EDBT 2004»
14 years 10 months ago
Mining Extremely Skewed Trading Anomalies
Trading surveillance systems screen and detect anomalous trades of equity, bonds, mortgage certificates among others. This is to satisfy federal trading regulations as well as to p...
Wei Fan, Philip S. Yu, Haixun Wang
SACMAT
2010
ACM
14 years 3 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
AMKM
2003
Springer
14 years 3 months ago
Discovering, Visualizing, and Sharing Knowledge through Personalized Learning Knowledge Maps
This paper presents an agent-based approach to semantic exploration and knowledge discovery in large information spaces by means of capturing, visualizing and making usable implic...
Jasminko Novak, Michael Wurst, Monika Fleischmann,...
ML
2010
ACM
175views Machine Learning» more  ML 2010»
13 years 4 months ago
Concept learning in description logics using refinement operators
With the advent of the Semantic Web, description logics have become one of the most prominent paradigms for knowledge representation and reasoning. Progress in research and applica...
Jens Lehmann, Pascal Hitzler
AUTOMATICA
2007
70views more  AUTOMATICA 2007»
13 years 10 months ago
Squaring the circle: An algorithm for generating polyhedral invariant sets from ellipsoidal ones
This paper presents a new (geometrical) approach to the computation of polyhedral (robustly) positively invariant (PI) sets for general (possibly discontinuous) nonlinear discrete...
A. Alessio, Mircea Lazar, Alberto Bemporad, W. P. ...