Sciweavers

7651 search results - page 1385 / 1531
» Information integration in the enterprise
Sort
View
DKE
2011
260views Education» more  DKE 2011»
14 years 5 months ago
Analysis on demand: Instantaneous soundness checking of industrial business process models
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications, and...
Dirk Fahland, Cédric Favre, Jana Koehler, N...
ESWS
2011
Springer
14 years 5 months ago
FedX: A Federation Layer for Distributed Query Processing on Linked Open Data
Driven by the success of the Linked Open Data initiative today’s Semantic Web is best characterized as a Web of interlinked datasets. Hand in hand with this structure new challen...
Andreas Schwarte, Peter Haase, Katja Hose, Ralf Sc...
FLAIRS
2011
14 years 5 months ago
Evaluating Semantic Metrics on Tasks of Concept Similarity
This study presents an evaluation of WordNet-based semantic similarity and relatedness measures in tasks focused on concept similarity. Assuming similarity as distinct from relate...
Hansen Andrew Schwartz, Fernando Gomez
IJON
2011
186views more  IJON 2011»
14 years 5 months ago
Discriminative structure selection method of Gaussian Mixture Models with its application to handwritten digit recognition
, Yunde Jia Model structure selection is currently an open problem in modeling data via Gaussian Mixture Models (GMM). This paper proposes a discriminative method to select GMM st...
Xuefeng Chen, Xiabi Liu, Yunde Jia
INFOCOM
2011
IEEE
14 years 5 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
« Prev « First page 1385 / 1531 Last » Next »