Sciweavers

134 search results - page 24 / 27
» Detecting Clones in Business Applications
Sort
View
DGO
2007
134views Education» more  DGO 2007»
13 years 10 months ago
Control patterns in a healthcare network
To keep a network of enterprises sustainable, inter-organizational control measures are needed to detect or prevent opportunistic behaviour of network participants. We present a m...
Vera Kartseva, Joris Hulstijn, Jaap Gordijn, Yao-H...
ICWS
2008
IEEE
13 years 10 months ago
Extending WS-Notification with an Expressive Event Notification Broker
Web service applications integrate explicit client-service interactions with notification-style programming. Such event-driven interactions are often called implicit invocations b...
Sven De Labey, Eric Steegmans
DGO
2003
140views Education» more  DGO 2003»
13 years 10 months ago
Social Welfare Program Administration and Evaluation and Policy Analysis Using Knowledge Discovery and Data Mining (KDD) on Admi
New technology in knowledge discovery and data mining (KDD) make it possible to extract valuable information from operational data. Private businesses already use the technology f...
Hye-Chung (Monica) Kum, Dean Duncan, Kimberly Flai...
CVPR
2011
IEEE
13 years 4 months ago
Monocular 3D Scene Understanding with Explicit Occlusion Reasoning
Scene understanding from a monocular, moving camera is a challenging problem with a number of applications including robotics and automotive safety. While recent systems have show...
Christian Wojek, Stefan Walk, Stefan Roth, Bernt S...
BPM
2009
Springer
340views Business» more  BPM 2009»
14 years 3 months ago
Abstractions in Process Mining: A Taxonomy of Patterns
ions in Process Mining: A Taxonomy of Patterns R.P. Jagadeesh Chandra Bose1,2 and Wil M.P. van der Aalst1 1 Department of Mathematics and Computer Science, University of Technology...
R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aa...