Sciweavers

28 search results - page 5 / 6
» Ontology-Based Information Extraction for Business Intellige...
Sort
View
HICSS
2003
IEEE
116views Biometrics» more  HICSS 2003»
14 years 22 days ago
Identifying a Company's Non-Customer Online Communities: a Proto-typology
This paper describes an exploratory, qualitative study of a process for extracting, identifying and exploiting an enterprise's implicit (less visible) web communities using l...
Edna O. F. Reid
ACL
2010
13 years 5 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
AMEC
2004
Springer
14 years 26 days ago
Multi-attribute Bilateral Bargaining in a One-to-Many Setting
Negotiations are an important way of reaching agreements between selfish autonomous agents. In this paper we focus on one-to-many bargaining within the context of agent-mediated e...
Enrico H. Gerding, D. J. A. Somefun, Han La Poutr&...
IKE
2010
13 years 5 months ago
Active Datawarehouse Loading by Tool Based ETL Procedure
: Over the years, DataWarehousing has gone through a number of evolutions from a relatively simple reporting database to sophisticated analytical applications such as analyzing cus...
Mallikharjuna Reddy V, Sanjay K. Jena
SIGMOD
2005
ACM
157views Database» more  SIGMOD 2005»
14 years 7 months ago
Meta-data version and configuration management in multi-vendor environments
Nearly all components that comprise modern information technology, such as Computer Aided Software Engineering (CASE) tools, Enterprise Application Integration (EAI) environments,...
John R. Friedrich