Sciweavers

DKE
2008
85views more  DKE 2008»
13 years 11 months ago
Detection and prediction of errors in EPCs of the SAP reference model
Jan Mendling, H. M. W. Verbeek, Boudewijn F. van D...
DKE
2008
99views more  DKE 2008»
13 years 11 months ago
Business process management
Schahram Dustdar, José Luiz Fiadeiro, Amit ...
DKE
2008
135views more  DKE 2008»
13 years 11 months ago
Analyzing interacting WS-BPEL processes using flexible model generation
We address the problem of analyzing the interaction between WS-BPEL processes. We present a technology chain that starts out with a WS-BPEL process and translates it into a Petri ...
Niels Lohmann, Peter Massuthe, Christian Stahl, Da...
DKE
2008
100views more  DKE 2008»
13 years 11 months ago
PeRSSonal's core functionality evaluation: Enhancing text labeling through personalized summaries
In this manuscript we present the summarization and categorization subsystems of a complete mechanism that begins with web-page fetching and concludes with representation of the c...
Christos Bouras, Vassilis Poulopoulos, Vassilis Ts...
DKE
2008
158views more  DKE 2008»
13 years 11 months ago
Integration and verification of semantic constraints in adaptive process management systems
Adaptivity in process management systems is key to their successful applicability in practice. Approaches have been already developed to ensure system correctness after arbitrary ...
Linh Thao Ly, Stefanie Rinderle, Peter Dadam
DKE
2008
68views more  DKE 2008»
13 years 11 months ago
Constructing customized process views
To enable effective cross-organizational collaborations, process providers have to offer external views on their internal processes to their partners. A process view hides details...
Rik Eshuis, Paul W. P. J. Grefen
DKE
2008
109views more  DKE 2008»
13 years 11 months ago
Deterministic algorithms for sampling count data
Processing and extracting meaningful knowledge from count data is an important problem in data mining. The volume of data is increasing dramatically as the data is generated by da...
Hüseyin Akcan, Alex Astashyn, Hervé Br...
DKE
2008
159views more  DKE 2008»
13 years 11 months ago
Isolated items discarding strategy for discovering high utility itemsets
Traditional methods of association rule mining consider the appearance of an item in a transaction, whether or not it is purchased, as a binary variable. However, customers may pu...
Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
DKE
2008
73views more  DKE 2008»
13 years 11 months ago
Capturing association among items in a database
Animesh Adhikari, P. R. Rao
DKE
2008
72views more  DKE 2008»
13 years 11 months ago
On space constrained set selection problems
Space constrained optimization problems arise in a variety of applications, ranging from databases to ubiquitous computing. Typically, these problems involve selecting a set of it...
Themis Palpanas, Nick Koudas, Alberto O. Mendelzon