Sciweavers

822 search results - page 61 / 165
» Visualization techniques utilizing the sensitivity analysis ...
Sort
View
116
Voted
WSC
2008
15 years 5 months ago
How to build valid and credible simulation models
In this tutorial we present techniques for building valid and credible simulation models. Ideas to be discussed include the importance of a definitive problem formulation, discuss...
Averill M. Law
119
Voted
IGPL
2010
125views more  IGPL 2010»
15 years 1 months ago
A normative multiagent approach to requirements engineering
In this paper we present a new model for the requirements analysis of a system. We offer a conceptual model defined following a visual modeling language, called dependence network...
Serena Villata
EMNLP
2010
15 years 19 days ago
Learning Recurrent Event Queries for Web Search
Recurrent event queries (REQ) constitute a special class of search queries occurring at regular, predictable time intervals. The freshness of documents ranked for such queries is ...
Ruiqiang Zhang, Yuki Konda, Anlei Dong, Pranam Kol...
132
Voted
DIS
2009
Springer
15 years 9 months ago
Using Data Mining for Wine Quality Assessment
Certification and quality assessment are crucial issues within the wine industry. Currently, wine quality is mostly assessed by physicochemical (e.g alcohol levels) and sensory (e...
Paulo Cortez, Juliana Teixeira, António Cer...
101
Voted
ICLP
2010
Springer
15 years 6 months ago
Circumscription and Projection as Primitives of Logic Programming
We pursue a representation of logic programs as classical first-order sentences. Different semantics for logic programs can then be expressed by the way in which they are wrapped...
Christoph Wernhard