Sciweavers

44 search results - page 6 / 9
» Logging key assurance indicators in business processes
Sort
View
VLDB
2002
ACM
98views Database» more  VLDB 2002»
14 years 9 months ago
Processing Star Queries on Hierarchically-Clustered Fact Tables
Star queries are the most prevalent kind of queries in data warehousing, OLAP and business intelligence applications. Thus, there is an imperative need for efficiently processing ...
Nikos Karayannidis, Aris Tsois, Timos K. Sellis, R...
CAISE
2009
Springer
15 years 1 months ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...
CASCON
2001
92views Education» more  CASCON 2001»
14 years 11 months ago
Extending the message flow debugger for MQSI
Integration and management of applications play key roles in today's computing. MQSeries is an asynchronous, assured application-to-application communication protocol designe...
Shuxia Tan, Eshrat Arjomandi, Richard F. Paige, Ev...
AUTONOMICS
2009
ACM
15 years 4 months ago
Sensor Selection for IT Infrastructure Monitoring
Supervisory control is the main means to assure a high level performance and availability of large IT infrastructures. Applied control theory is used in physical and virtualization...
Gergely János Paljak, Imre Kocsis, Zolt&aac...
JTAER
2008
100views more  JTAER 2008»
14 years 9 months ago
Securing Uniqueness of Rights e-Documents: A Deontic Process Perspective
We typically think of documents as carrying information. However, certain kinds of documents do more than that: they are not only informative but also performative in that they re...
Ronald M. Lee, Vu Nguyen, Anastasia Pagnoni