Sciweavers

2826 search results - page 380 / 566
» A resource-based analysis of IT sourcing
Sort
View
DOLAP
2005
ACM
15 years 3 months ago
A relevance-extended multi-dimensional model for a data warehouse contextualized with documents
Current data warehouse and OLAP technologies can be applied to analyze the structured data that companies store in their databases. The circumstances that describe the context ass...
Juan Manuel Pérez, Rafael Berlanga Llavori,...
DOCENG
2008
ACM
15 years 3 months ago
Malan: a mapping language for the data manipulation
Malan is a MApping LANguage that allows the generation of transformation programs by specifying a schema mapping between a source and target data schema. By working at the schema ...
Arnaud Blouin, Olivier Beaudoux, Stéphane L...
ICMLA
2008
15 years 3 months ago
Semi-supervised IFA with Prior Knowledge on the Mixing Process: An Application to a Railway Device Diagnosis
Independent Factor Analysis (IFA) is a well known method used to recover independent components from their linear observed mixtures without any knowledge on the mixing process. Su...
Etienne Côme, Zohra Leila Cherfi, Latifa Ouk...
WICON
2008
15 years 3 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
CSC
2006
15 years 3 months ago
Numerical Experiments on the Generation of Normal Mode Rossby Waves
s Normal mode Rossby waves are simulated with an efficient Double Fourier Series (DFS) spectral model, and their structures are investigated by the Empirical Orthogonal Function (E...
Hyeong-Bin Cheong, In-Hyuk Kwon