Sciweavers

2212 search results - page 75 / 443
» Approaches to Hospital Process Management
Sort
View
CIDM
2009
IEEE
14 years 5 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
FGCN
2007
IEEE
119views Communications» more  FGCN 2007»
14 years 4 months ago
A Novel Adaptive Load Shedding Scheme for Data Stream Processing
In this paper, we present a novel feedback control-based load shedding scheme for data stream processing. Firstly we apply system identification to establish a dynamic model to de...
Yunyi Zhang, Chongzheng Huang, Deyun Zhang
ICALT
2007
IEEE
14 years 4 months ago
The Web 2.0 Driven SECI Model Based Learning Process
Nonaka and his knowledge transformation model SECI revolutionized the thinking about organizations as social learning systems. He introduced technical concepts like hypertext into...
Mohamed Amine Chatti, Ralf Klamma, Matthias Jarke,...
ICDE
2006
IEEE
141views Database» more  ICDE 2006»
14 years 4 months ago
Dealing with Overload in Distributed Stream Processing Systems
Overload management has been an important problem for large-scale dynamic systems. In this paper, we study this problem in the context of our Borealis distributed stream processin...
Nesime Tatbul, Stanley B. Zdonik
EUSFLAT
2003
134views Fuzzy Logic» more  EUSFLAT 2003»
13 years 11 months ago
Fuzzy approaches to access information on the web: recent developments and research trends
In this paper some research trends are presented concerning the application of fuzzy techniques to model flexible systems for the access to information on the WWW. The focus is o...
Enrique Herrera-Viedma, Gabriella Pasi