Sciweavers

1328 search results - page 186 / 266
» Common Knowledge
Sort
View
ADMA
2005
Springer
202views Data Mining» more  ADMA 2005»
13 years 10 months ago
A Latent Usage Approach for Clustering Web Transaction and Building User Profile
Web transaction data between web visitors and web functionalities usually convey users’ task-oriented behavior patterns. Clustering web transactions, thus, may capture such infor...
Yanchun Zhang, Guandong Xu, Xiaofang Zhou
APSEC
2008
IEEE
13 years 10 months ago
Risks and Risk Management in Software Architecture Evolution: An Industrial Survey
The effort that has been made to study risk management in the context of software architecture and its evolution, has so far focused on output from structured evaluations. However...
Odd Petter N. Slyngstad, Reidar Conradi, Muhammad ...
CSCLP
2008
Springer
13 years 10 months ago
From Rules to Constraint Programs with the Rules2CP Modelling Language
In this paper, we present a rule-based modelling language for constraint programming, called Rules2CP. Unlike other modelling languages, Rules2CP adopts a single knowledge represen...
François Fages, Julien Martin
DEBS
2008
ACM
13 years 10 months ago
Relative temporal constraints in the Rete algorithm for complex event detection
Complex Event Processing is an important technology for information systems with a broad application space ranging from supply chain management, systems monitoring, and stock mark...
Karen Walzer, Tino Breddin, Matthias Groch
EKAW
2008
Springer
13 years 10 months ago
A Platform for Object-Action Semantic Web Interaction
Semantic Web applications tests show that their usability is seriously compromised. This motivates the exploration of alternative interaction paradigms, different from the "tr...
Roberto García, Juan Manuel Gimeno, Ferran ...