Sciweavers

134 search results - page 22 / 27
» Detecting Clones in Business Applications
Sort
View
KDD
2004
ACM
209views Data Mining» more  KDD 2004»
14 years 10 months ago
Tracking dynamics of topic trends using a finite mixture model
In a wide range of business areas dealing with text data streams, including CRM, knowledge management, and Web monitoring services, it is an important issue to discover topic tren...
Satoshi Morinaga, Kenji Yamanishi
DEBS
2007
ACM
13 years 11 months ago
Identification of suspicious, unknown event patterns in an event cloud
This paper describes an approach to detect unknown event patterns. In this context, an event is not only something that happens, but also something that can be analysed. This task...
Alexander Widder, Rainer von Ammon, Philippe Schae...
OTM
2009
Springer
14 years 4 months ago
Semantic Event Correlation Using Ontologies
Complex event processing (CEP) is a software architecture paradigm that aims at low latency, high throughput, and quick adaptability of applications for supporting and improving ev...
Thomas Moser, Heinz Roth, Szabolcs Rozsnyai, Richa...
DEXAW
2006
IEEE
116views Database» more  DEXAW 2006»
14 years 3 months ago
Architecture Evaluation for Distributed Auto-ID Systems
Auto-ID technologies allow capturing the time and location of products in the supply chain for tracking and tracing. This paves the way for a variety of business applications, suc...
Hong Hai Do, Jürgen Anke, Gregor Hackenbroich
WECWIS
2005
IEEE
142views ECommerce» more  WECWIS 2005»
14 years 3 months ago
Implementing Web Service Protocols in SOA: WS-Coordination and WS-BusinessActivity
Web Service protocol standards should be unambiguous and provide a complete description of the allowed behavior of the protocols’ participants. Implementation of such protocols ...
Friedrich H. Vogt, Simon Zambrovski, Boris Gruschk...