Sciweavers

377 search results - page 62 / 76
» Towards Alternative Approaches to Reasoning About Goals
Sort
View
SIGMOD
2009
ACM
175views Database» more  SIGMOD 2009»
14 years 10 months ago
QoX-driven ETL design: reducing the cost of ETL consulting engagements
As business intelligence becomes increasingly essential for organizations and as it evolves from strategic to operational, the complexity of Extract-Transform-Load (ETL) processes...
Alkis Simitsis, Kevin Wilkinson, Malú Caste...
GFKL
2006
Springer
133views Data Mining» more  GFKL 2006»
14 years 2 months ago
Adaptive Conjoint Analysis for Pricing Music Downloads
Finding the right pricing for music downloads is of ample importance to the recording industry and music download service providers. For the recently introduced music downloads, re...
Christoph Breidert, Michael Hahsler
CEC
2010
IEEE
13 years 11 months ago
Beyond No Free Lunch: Realistic algorithms for arbitrary problem classes
In this paper we present a simple and general new No Free Lunch-like result that applies to revisiting algorithms searching arbitrary problem sets. We begin by unifying the assumpt...
James A. R. Marshall, Thomas G. Hinton
IWC
2007
134views more  IWC 2007»
13 years 10 months ago
Disrupting digital library development with scenario informed design
In recent years, there has been great interest in scenario-based design and other forms of user-centred design. However, there are many design processes that, often for good reaso...
Ann Blandford, Suzette Keith, Richard Butterworth,...
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
14 years 2 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...