Sciweavers

1893 search results - page 316 / 379
» Eliciting and Validating Knowledge in Knowledge Management S...
Sort
View
CHIMIT
2007
ACM
14 years 1 days ago
Supporting expertise awareness: finding out what others know
This paper presents an innovative approach to solve the problem of missing transparency of competencies within virtual organizations. We based our work on empirical studies to cop...
Christian Dörner, Volkmar Pipek, Markus Won
DEBS
2008
ACM
13 years 9 months ago
Relative temporal constraints in the Rete algorithm for complex event detection
Complex Event Processing is an important technology for information systems with a broad application space ranging from supply chain management, systems monitoring, and stock mark...
Karen Walzer, Tino Breddin, Matthias Groch
CASCON
2008
100views Education» more  CASCON 2008»
13 years 9 months ago
Is it a bug or an enhancement?: a text-based approach to classify change requests
Bug tracking systems are valuable assets for managing maintenance activities. They are widely used in open-source projects as well as in the software industry. They collect many d...
Giuliano Antoniol, Kamel Ayari, Massimiliano Di Pe...
DMIN
2006
144views Data Mining» more  DMIN 2006»
13 years 9 months ago
Discovering Assignment Rules in Workforce Schedules Using Data Mining
Discovering hidden patterns in large sets of workforce schedules to gain insight into the potential knowledge in workforce schedules are crucial to better understanding the workfor...
Jihong Yan
CUZA
2002
129views more  CUZA 2002»
13 years 7 months ago
Ad Hoc Metacomputing with Compeer
Metacomputing allows the exploitation of geographically seperate, heterogenous networks and resources. Most metacomputers are feature rich and carry a long, complicated installati...
Keith Power, John P. Morrison