Sciweavers

ICEIS
2005
IEEE
14 years 5 months ago
A Formal Definition for Object-Relational Database Metrics
Aline Lúcia Baroni, Coral Calero, Mario Pia...
HICSS
2005
IEEE
89views Biometrics» more  HICSS 2005»
14 years 5 months ago
The Human Context of Information Systems
In its past, IS research has focused on IT and the organizations that use IT. Human issues have been studied in HCI and the Human Factor Studies of MIS. Yet recently a new wave of...
Minna Koskinen, Eleni Berki, Katja Liimatainen, Mi...
HICSS
2005
IEEE
138views Biometrics» more  HICSS 2005»
14 years 5 months ago
A Method to Redesign the IS Portfolios in Large Organisations
Over the past decades, large organisations have developed increasingly complex portfolios of information systems to support business processes. Maintenance and leveraging of these...
Remco Groot, Martin Smits, Halbe Kuipers
3DGIS
2006
Springer
14 years 5 months ago
Reconstruction of Complex Buildings using LIDAR and 2D Maps
The extraction of the building models from remote-sensed data is an important work in the geographic information systems. This investigation describes an approach to integrate LIDA...
Tee-Ann Teo, Jiann-Yeou Rau, Liang-Chien Chen, Jin...
ADVIS
2006
Springer
14 years 6 months ago
Structural and Event Based Multimodal Video Data Modeling
Investments on multimedia technology enable us to store many more reflections of the real world in digital world as videos. By recording videos about real world entities, we carry...
Hakan Öztarak, Adnan Yazici
ADVIS
2006
Springer
14 years 6 months ago
Integrated Expert Management Knowledge on OSI Network Management Objects
Abstract. The management of modern telecommunications networks must satisfy ever-increasing operational demands. We propose a study for the improvement of intelligent administratio...
Antonio Martín, Carlos León, F&eacut...
ADVIS
2006
Springer
14 years 6 months ago
Validation of XML Documents: From UML Models to XML Schemas and XSLT Stylesheets
The widespread use of XML brings out the need of ensuring the validity of XML data. The use of languages such as XML Schema makes easier the process of verification of XML documen...
Eladio Domínguez, Jorge Lloret, Angel Luis ...
ADVIS
2006
Springer
14 years 6 months ago
Checking Violation Tolerance of Approaches to Database Integrity
A hitherto unquestioned assumption made by all methods for integrity checking has been that the database satisfies its constraints before each update. This consistency assumption ...
Hendrik Decker, Davide Martinenghi
ADVIS
2006
Springer
14 years 6 months ago
Chat Mining for Gender Prediction
Abstract. The aim of this paper is to investigate the feasibility of predicting the gender of a text document’s author using linguistic evidence. For this purpose, term- and styl...
Tayfun Kucukyilmaz, Berkant Barla Cambazoglu, Cevd...