Sciweavers

180 search results - page 23 / 36
» Certain answers as objects and knowledge
Sort
View
HASE
1998
IEEE
13 years 11 months ago
Design for Constraint Violation Detection in Safety-Critical Systems
In safety-critical systems, certain safety constraints must be satisfied before an operation can be performed. Such constraints typically depend on the state of the system at the ...
Satish Subramanian, Sanjai Rayadurgam, Wei-Tek Tsa...
ELECTRONICMARKETS
2010
124views more  ELECTRONICMARKETS 2010»
13 years 4 months ago
The difficulty of studying inter-organisational IS phenomena on large scales: critical reflections on a research journey
We argue that certain theoretical commitments that underpin much existing Interorganisational Information Systems (IOIS) research at small scales become untenable when IOIS are st...
Kai Reimers, Robert B. Johnston, Stefan Klein
ECAI
2010
Springer
13 years 8 months ago
ANTIPA: an agent architecture for intelligent information assistance
Abstract. Human users trying to plan and accomplish informationdependent goals in highly dynamic environments with prevalent uncertainty must consult various types of information s...
Jean Oh, Felipe Meneguzzi, Katia P. Sycara
EDBT
2009
ACM
208views Database» more  EDBT 2009»
14 years 2 months ago
Flexible and efficient querying and ranking on hyperlinked data sources
There has been an explosion of hyperlinked data in many domains, e.g., the biological Web. Expressive query languages and effective ranking techniques are required to convert this...
Ramakrishna Varadarajan, Vagelis Hristidis, Louiqa...
ICDE
2007
IEEE
106views Database» more  ICDE 2007»
14 years 1 months ago
Mining Trajectory Databases via a Suite of Distance Operators
With the rapid progress of mobile devices and positioning technologies, Trajectory Databases (TD) have been in the core of database research during the last decade. Analysis and k...
Nikos Pelekis, Ioannis Kopanakis, Irene Ntoutsi, G...