Sciweavers

314 search results - page 55 / 63
» Evaluation of Technologies for Business Process Automation
Sort
View
SQJ
2010
152views more  SQJ 2010»
13 years 5 months ago
Design pattern evolutions in QVT
One of the main goals of design patterns is to design for change. Many design patterns leave some room for future changes and evolutions. The application of design patterns leads ...
Jing Dong, Yajing Zhao, Yongtao Sun
GIS
2008
ACM
14 years 8 months ago
Mining user similarity based on location history
The pervasiveness of location-acquisition technologies (GPS, GSM networks, etc.) enable people to conveniently log the location histories they visited with spatio-temporal data. T...
Quannan Li, Yu Zheng, Xing Xie, Yukun Chen, Wenyu ...
TOMACS
2011
139views more  TOMACS 2011»
13 years 2 months ago
The double CFTP method
We consider the problem of the exact simulation of random variables Z that satisfy the distributional identity Z L = V Y + (1 − V )Z, where V ∈ [0, 1] and Y are independent, an...
Luc Devroye, Lancelot F. James
WEBI
2009
Springer
14 years 2 months ago
Mining a Multilingual Geographical Gazetteer from the Web
Geographical gazetteers are necessary in a wide variety of applications. In the past, the construction of such gazetteers has been a tedious, manual process and only recently have...
Adrian Popescu, Gregory Grefenstette, Houda Bouamo...
ESWS
2004
Springer
13 years 11 months ago
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
Gaining access to sensitive resources on the Web usually involves an explicit registration step, where the client has to provide a predetermined set of information to the server. T...
Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla,...