Sciweavers

2588 search results - page 466 / 518
» Project risk management
Sort
View
PODS
2009
ACM
113views Database» more  PODS 2009»
14 years 8 months ago
Relative information completeness
The paper investigates the question of whether a partially closed database has complete information to answer a query. In practice an enterprise often maintains master data Dm, a ...
Wenfei Fan, Floris Geerts
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
14 years 8 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
PODS
2007
ACM
159views Database» more  PODS 2007»
14 years 7 months ago
Generalized hypertree decompositions: np-hardness and tractable variants
The generalized hypertree width GHW(H) of a hypergraph H is a measure of its cyclicity. Classes of conjunctive queries or constraint satisfaction problems whose associated hypergr...
Georg Gottlob, Thomas Schwentick, Zoltán Mi...
OZCHI
2009
ACM
14 years 2 months ago
Towards an ethical interaction design: the issue of including stakeholders in law-enforcement software development
In the public sector (particularly in the UK in light of recent reforms i.e. the Local Government Act 2000, etc.) a greater degree of accountability and public involvement or inte...
Patrick G. Watson, Penny Duquenoy, Margaret Brenna...
MHCI
2009
Springer
14 years 2 months ago
Information empowerment through mobile learning
Information empowers those who make sense from its successful interpretation; this is especially true on the subject of weather where the recipient is required to have prior forms...
Raymond Koon Chuan Koh, Henry Xin Liong Tan, Henry...