Sciweavers

822 search results - page 61 / 165
» Visualization techniques utilizing the sensitivity analysis ...
Sort
View
WSC
2008
13 years 10 months ago
How to build valid and credible simulation models
In this tutorial we present techniques for building valid and credible simulation models. Ideas to be discussed include the importance of a definitive problem formulation, discuss...
Averill M. Law
IGPL
2010
125views more  IGPL 2010»
13 years 6 months ago
A normative multiagent approach to requirements engineering
In this paper we present a new model for the requirements analysis of a system. We offer a conceptual model defined following a visual modeling language, called dependence network...
Serena Villata
EMNLP
2010
13 years 6 months ago
Learning Recurrent Event Queries for Web Search
Recurrent event queries (REQ) constitute a special class of search queries occurring at regular, predictable time intervals. The freshness of documents ranked for such queries is ...
Ruiqiang Zhang, Yuki Konda, Anlei Dong, Pranam Kol...
DIS
2009
Springer
14 years 2 months ago
Using Data Mining for Wine Quality Assessment
Certification and quality assessment are crucial issues within the wine industry. Currently, wine quality is mostly assessed by physicochemical (e.g alcohol levels) and sensory (e...
Paulo Cortez, Juliana Teixeira, António Cer...
ICLP
2010
Springer
14 years 1 hour ago
Circumscription and Projection as Primitives of Logic Programming
We pursue a representation of logic programs as classical first-order sentences. Different semantics for logic programs can then be expressed by the way in which they are wrapped...
Christoph Wernhard