Sciweavers

7865 search results - page 1422 / 1573
» Peer-to-Peer Data Management
Sort
View
CIDR
2009
136views Algorithms» more  CIDR 2009»
14 years 11 months ago
The Role of Schema Matching in Large Enterprises
To date, the principal use case for schema matching research has been as a precursor for code generation, i.e., constructing mappings between schema elements with the end goal of ...
Ken Smith, Michael Morse, Peter Mork, Maya Hao Li,...
COMAD
2009
14 years 11 months ago
Consistency of Databases on Commodity Disk Drives
Most database systems use ARIES-like logging and recovery scheme to recover from failures and guarantee transactional consistency. ARIES relies on the Write-Ahead Logging (WAL) pr...
Robin Dhamankar, Hanuma Kodavalla, Vishal Kathuria
ECTEL
2010
Springer
14 years 11 months ago
Knowledge Maturing Activities and Practices Fostering Organisational Learning: Results of an Empirical Study
Abstract. Knowledge work is performed in all occupations and across all industries. The level of similarity of knowledge work allows for designing supporting tools that can be wide...
Andreas Kaschig, Ronald Maier, Alexander Sandow, M...
CONEXT
2009
ACM
14 years 11 months ago
Macroscope: end-point approach to networked application dependency discovery
Enterprise and data center networks consist of a large number of complex networked applications and services that depend upon each other. For this reason, they are difficult to ma...
Lucian Popa 0002, Byung-Gon Chun, Ion Stoica, Jaid...
GECCO
2008
Springer
115views Optimization» more  GECCO 2008»
14 years 11 months ago
A genetic programming approach to business process mining
The aim of process mining is to identify and extract process patterns from data logs to reconstruct an overall process flowchart. As business processes become more and more comple...
Chris J. Turner, Ashutosh Tiwari, Jörn Mehnen
« Prev « First page 1422 / 1573 Last » Next »