Sciweavers

994 search results - page 108 / 199
» Custom Computing Machines for the Set Covering Problem
Sort
View
86
Voted
BPM
2010
Springer
186views Business» more  BPM 2010»
15 years 1 months ago
How to Implement a Theory of Correctness in the Area of Business Processes and Services
During the previous years, we presented several results concerned with various issues related to the correctness of models for business processes and services (i. e., interorganiza...
Niels Lohmann, Karsten Wolf
78
Voted
CONSTRAINTS
2007
46views more  CONSTRAINTS 2007»
15 years 17 days ago
Local-search Extraction of MUSes
SAT is probably one of the most-studied constraint satisfaction problems. In this paper, a new hybrid technique based on local search is introduced in order to approximate and ext...
Éric Grégoire, Bertrand Mazure, C&ea...
94
Voted
EMNLP
2010
14 years 10 months ago
Using Unknown Word Techniques to Learn Known Words
Unknown words are a hindrance to the performance of hand-crafted computational grammars of natural language. However, words with incomplete and incorrect lexical entries pose an e...
Kostadin Cholakov, Gertjan van Noord
SRDS
2010
IEEE
14 years 10 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
IPPS
2000
IEEE
15 years 5 months ago
PaDDMAS: Parallel and Distributed Data Mining Application Suite
Discovering complex associations, anomalies and patterns in distributed data sets is gaining popularity in a range of scientific, medical and business applications. Various algor...
Omer F. Rana, David W. Walker, Maozhen Li, Steven ...