Sciweavers

2421 search results - page 296 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
138
Voted
ICLP
1997
Springer
15 years 9 months ago
Non-Failure Analysis for Logic Programs
We provide a method whereby, given mode and (upper approximation) type information, we can detect procedures and goals that can be guaranteed to not fail (i.e., to produce at leas...
Saumya K. Debray, Pedro López-García...
153
Voted
TKDE
2008
154views more  TKDE 2008»
15 years 4 months ago
Analyzing the Structure and Evolution of Massive Telecom Graphs
Abstract-- With ever growing competition in telecommunications markets, operators have to increasingly rely on business intelligence to offer the right incentives to their customer...
Amit Anil Nanavati, Rahul Singh, Dipanjan Chakrabo...
ANOR
2007
92views more  ANOR 2007»
15 years 5 months ago
Portfolio selection with probabilistic utility
We present a novel portfolio selection technique, which replaces the traditional maximization of the utility function with a probabilistic approach inspired by statistical physics....
Robert Marschinski, Pietro Rossi, Massimo Tavoni, ...
DKE
2011
260views Education» more  DKE 2011»
14 years 8 months ago
Analysis on demand: Instantaneous soundness checking of industrial business process models
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications, and...
Dirk Fahland, Cédric Favre, Jana Koehler, N...
145
Voted
EMNLP
2009
15 years 2 months ago
Generating High-Coverage Semantic Orientation Lexicons From Overtly Marked Words and a Thesaurus
Sentiment analysis often relies on a semantic orientation lexicon of positive and negative words. A number of approaches have been proposed for creating such lexicons, but they te...
Saif Mohammad, Cody Dunne, Bonnie J. Dorr