Sciweavers

1039 search results - page 200 / 208
» Using GXL for exchanging business process models
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 8 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
APSEC
2001
IEEE
14 years 3 days ago
Orchestrating Computations on the World-Wide Web
Word processing software, email, and spreadsheet have revolutionized office activities. There are many other office tasks that are amenable to automation, such as: scheduling a vi...
Jayadev Misra, Harrick M. Vin
WSC
1997
13 years 9 months ago
Success Stories in Simulation in Health Care
Healthcare is a rapidly changing industry, and facilities are struggling to find tools to enhance their ability to keep up with the change. Healthcare staff have generally adapted...
Catherine Drury Barnes, Joaquin L. Quiason, Carson...
KDD
2009
ACM
211views Data Mining» more  KDD 2009»
14 years 9 months ago
Address standardization with latent semantic association
Address standardization is a very challenging task in data cleansing. To provide better customer relationship management and business intelligence for customer-oriented cooperates...
Honglei Guo, Huijia Zhu, Zhili Guo, Xiaoxun Zhang,...
ICDE
2003
IEEE
209views Database» more  ICDE 2003»
14 years 9 months ago
An Evaluation of Regular Path Expressions with Qualifiers against XML Streams
This paper presents SPEX, a streamed and progressive evaluation of regular path expressions with XPath-like qualifiers against XML streams. SPEX proceeds as follows. An expression...
Dan Olteanu, François Bry, Tobias Kiesling