Sciweavers

140 search results - page 23 / 28
» Discovery of Functional Architectures From Event Logs
Sort
View
SPAA
2005
ACM
15 years 4 months ago
Admission control to minimize rejections and online set cover with repetitions
We study the admission control problem in general networks. Communication requests arrive over time, and the online algorithm accepts or rejects each request while maintaining the...
Noga Alon, Yossi Azar, Shai Gutner
BIS
2009
154views Business» more  BIS 2009»
15 years 12 days ago
Using Process Mining to Generate Accurate and Interactive Business Process Maps
Abstract. The quality of today's digital maps is very high. This allows for new functionality as illustrated by modern car navigation systems (e.g., TomTom, Garmin, etc.), Goo...
Wil M. P. van der Aalst
ICDE
2010
IEEE
177views Database» more  ICDE 2010»
15 years 6 months ago
Optimal load shedding with aggregates and mining queries
— To cope with bursty arrivals of high-volume data, a DSMS has to shed load while minimizing the degradation of Quality of Service (QoS). In this paper, we show that this problem...
Barzan Mozafari, Carlo Zaniolo
CHI
2004
ACM
15 years 11 months ago
DiamondSpin: an extensible toolkit for around-the-table interaction
DiamondSpin is a toolkit for the efficient prototyping of and experimentation with multi-person, concurrent interfaces for interactive shared displays. In this paper, we identify ...
Chia Shen, Clifton Forlines, Frédéri...
ICECCS
2009
IEEE
161views Hardware» more  ICECCS 2009»
15 years 6 months ago
Formal Modelling and Analysis of Business Information Applications with Fault Tolerant Middleware
Distributed information systems are critical to the functioning of many businesses; designing them to be dependable is a challenging but important task. We report our experience i...
Jeremy Bryans, John S. Fitzgerald, Alexander Roman...