Sciweavers

240 search results - page 48 / 48
» Privacy and Utility in Business Processes
Sort
View
UPP
2004
Springer
13 years 10 months ago
Inverse Design of Cellular Automata by Genetic Algorithms: An Unconventional Programming Paradigm
Evolving solutions rather than computing them certainly represents an unconventional programming approach. The general methodology of evolutionary computation has already been know...
Thomas Bäck, Ron Breukelaar, Lars Willmes
ICDCS
2002
IEEE
13 years 10 months ago
A Practical Approach for ?Zero? Downtime in an Operational Information System
An Operational Information System (OIS) supports a real-time view of an organization’s information critical to its logistical business operations. A central component of an OIS ...
Ada Gavrilovska, Karsten Schwan, Van Oleson
CIKM
2006
Springer
13 years 8 months ago
Mining compressed commodity workflows from massive RFID data sets
Radio Frequency Identification (RFID) technology is fast becoming a prevalent tool in tracking commodities in supply chain management applications. The movement of commodities thr...
Hector Gonzalez, Jiawei Han, Xiaolei Li
VLDB
2002
ACM
120views Database» more  VLDB 2002»
13 years 4 months ago
Improving Data Access of J2EE Applications by Exploiting Asynchronous Messaging and Caching Services
The J2EE platform provides a variety of options for making business data persistent using DBMS technology. However, the integration with existing backend database systems has prov...
Samuel Kounev, Alejandro P. Buchmann
HICSS
2003
IEEE
176views Biometrics» more  HICSS 2003»
13 years 10 months ago
Ad-Hoc Association-Rule Mining within the Data Warehouse
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...
Svetlozar Nestorov, Nenad Jukic