Sciweavers

1004 search results - page 187 / 201
» Safe Constraint Queries
Sort
View
CCR
2010
131views more  CCR 2010»
15 years 16 days ago
DECOR: DEClarative network management and OpeRation
Network management operations are complicated, tedious and error-prone, requiring significant human involvement and expert knowledge. In this paper, we first examine the fundament...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...
IDA
2006
Springer
15 years 13 days ago
Supporting bi-cluster interpretation in 0/1 data by means of local patterns
Clustering or co-clustering techniques have been proved useful in many application domains. A weakness of these techniques remains the poor support for grouping characterization. ...
Ruggero G. Pensa, Céline Robardet, Jean-Fra...
95
Voted
LOGCOM
2007
97views more  LOGCOM 2007»
15 years 9 days ago
A General Framework for Expressing Preferences in Causal Reasoning and Planning
We consider the problem of incorporating arbitrary preferences in planning systems. A preference may be seen as a goal or constraint that is desirable, but not necessary, to satis...
James P. Delgrande, Torsten Schaub, Hans Tompits
114
Voted
APIN
2000
143views more  APIN 2000»
15 years 8 days ago
Conceptual Models and Architectures for Advanced Information Systems
Abstract. This paper addresses several issues related to the use of conceptual modeling to support serviceoriented, advanced information systems. It shows how conceptual modeling o...
Larry Kerschberg, Doyle Weishar
ISCI
2002
132views more  ISCI 2002»
15 years 3 days ago
Mobile data and transaction management
Mobile computing paradigm has emerged due to advances in wireless or cellular networking technology. This rapidly expanding technology poses many challenging research problems in ...
Sanjay Kumar Madria, Mukesh K. Mohania, Sourav S. ...