Sciweavers

1621 search results - page 87 / 325
» What is Business Intelligence
Sort
View
PODS
2011
ACM
238views Database» more  PODS 2011»
12 years 11 months ago
Beyond simple aggregates: indexing for summary queries
Database queries can be broadly classified into two categories: reporting queries and aggregation queries. The former retrieves a collection of records from the database that mat...
Zhewei Wei, Ke Yi
ACSAC
2009
IEEE
14 years 2 months ago
The Good, the Bad, And the Ugly: Stepping on the Security Scale
: Metrics are both fashionable and timely: many regulations that affect cybersecurity rely upon metrics – albeit, of the checklist variety in many cases – to ascertain complian...
Mary Ann Davidson
AAAI
2006
13 years 9 months ago
Constraint-Based Random Stimuli Generation for Hardware Verification
We report on random stimuli generation for hardware verification in IBM as a major application of various artificial intelligence technologies, including knowledge representation,...
Yehuda Naveh, Michal Rimon, Itai Jaeger, Yoav Katz...
NMR
2004
Springer
14 years 1 months ago
Dialogues and HY-arguments
This paper introduces a new class called hang yourself (HY) arguments into the theory of defeasible argumentation. The novelty of such arguments is that they are inherently destru...
Martin Caminada
NOMS
2008
IEEE
131views Communications» more  NOMS 2008»
14 years 2 months ago
Availability "weak point" analysis over an SOA deployment framework
— Availability is one of the important factors to be considered for business-driven IT service management. This paper addresses the issue of analyzing what we call availability w...
Lei Xie, Jing Luo, Jie Qiu, John A. Pershing, Ying...