Sciweavers

2340 search results - page 58 / 468
» Second quarter 2008
Sort
View
DLOG
2008
15 years 2 months ago
A Kernel Revision Operator for Terminologies
Abstract. In this paper, we propose a new method for revising terminologies in description logic-based ontologies. Our revision method is a reformulation of the kernel revision ope...
Guilin Qi, Peter Haase, Zhisheng Huang, Jeff Z. Pa...
WSC
2008
15 years 2 months ago
Automating warm-up length estimation
There are two key issues in assuring the accuracy of estimates of performance obtained from a simulation model. The first is the removal of any initialisation bias, the second is ...
Kathryn Hoad, Stewart Robinson, Ruth Davies
ANTS
2008
Springer
110views Algorithms» more  ANTS 2008»
15 years 1 months ago
Computing Hilbert Class Polynomials
We present and analyze two algorithms for computing the Hilbert class polynomial HD. The first is a p-adic lifting algorithm for inert primes p in the order of discriminant D < ...
Juliana Belding, Reinier Bröker, Andreas Enge...
BPM
2008
Springer
147views Business» more  BPM 2008»
15 years 1 months ago
Business Process Modelling with Continuous Validation
In this paper, we demonstrate the prototype of a modelling tool that applies graph-based rules for identifying problems in business process models. The advantages of our approach a...
Stefan Kühne, Heiko Kern, Volker Gruhn, Ralf ...
CEAS
2008
Springer
15 years 1 months ago
Empirical research on IP blacklisting
This paper describes two innovative analysis methods for IPv4 address sets such as antispam blacklists. First, the contents analysis provides means of measuring key properties of ...
Christian Dietrich, Christian Rossow