Sciweavers

2623 search results - page 484 / 525
» Conceptual Application Domain Modelling
Sort
View
SAC
2008
ACM
15 years 1 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer
CPAIOR
2010
Springer
15 years 16 days ago
Boosting Set Constraint Propagation for Network Design
Abstract. This paper reconsiders the deployment of synchronous optical networks (SONET), an optimization problem naturally expressed in terms of set variables. Earlier approaches, ...
Justin Yip, Pascal Van Hentenryck, Carmen Gervet
IFIPTM
2010
145views Management» more  IFIPTM 2010»
15 years 14 days ago
A Formal Notion of Trust - Enabling Reasoning about Security Properties
Historically, various different notions of trust can be found, each addressing particular aspects of ICT systems, e.g. trust in electronic commerce systems based on reputation and...
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolp...
OOPSLA
2010
Springer
15 years 11 days ago
Ficticious: MicroLanguages for interactive fiction
In this paper we provide an experience report where language oriented programming approaches are applied to complex game design. Ficticious is a G-expression based pidgin of sever...
James Dean Palmer
CEC
2010
IEEE
15 years 5 hour ago
Active Learning Genetic programming for record deduplication
The great majority of genetic programming (GP) algorithms that deal with the classification problem follow a supervised approach, i.e., they consider that all fitness cases availab...
Junio de Freitas, Gisele L. Pappa, Altigran Soares...