Sciweavers

928 search results - page 99 / 186
» Safety management of complex technology
Sort
View
JAPLL
2010
179views more  JAPLL 2010»
14 years 8 months ago
Tractable query answering and rewriting under description logic constraints
Answering queries over an incomplete database w.r.t. a set of constraints is an important computational task with applications in fields as diverse as information integration and ...
Héctor Pérez-Urbina, Boris Motik, Ia...
AEI
2010
148views more  AEI 2010»
14 years 10 months ago
Modeling and monitoring of construction supply chains
The planning and management of supply chains require properly specifying the participating members and the relationships among them. Construction supply chains usually consist of n...
Jack C. P. Cheng, Kincho H. Law, Hans Bjornsson, A...
WWW
2004
ACM
15 years 10 months ago
A smart hill-climbing algorithm for application server configuration
The overwhelming success of the Web as a mechanism for facilitating information retrieval and for conducting business transactions has led to an increase in the deployment of comp...
Bowei Xi, Zhen Liu, Mukund Raghavachari, Cathy H. ...
IMC
2010
ACM
14 years 8 months ago
Revisiting the case for a minimalist approach for network flow monitoring
Network management applications require accurate estimates of a wide range of flow-level traffic metrics. Given the inadequacy of current packet-sampling-based solutions, several ...
Vyas Sekar, Michael K. Reiter, Hui Zhang
CIKM
2009
Springer
15 years 4 months ago
L2 norm regularized feature kernel regression for graph data
Features in many real world applications such as Cheminformatics, Bioinformatics and Information Retrieval have complex internal structure. For example, frequent patterns mined fr...
Hongliang Fei, Jun Huan