Sciweavers

136 search results - page 25 / 28
» Temporal Logics on Words with Multiple Data Values
Sort
View
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
15 years 4 months ago
Development and Validation of Scales to Measure the Strategic Potential of IT-Enabled Resources: A Resource-Based Approach
This paper describes the development of reliable and valid scales for assessing the strategic potential of IT-enabled resources. Following to the resource-based view of the firm (...
Saggi Nevo, Michael R. Wade
ICDT
2009
ACM
248views Database» more  ICDT 2009»
15 years 10 months ago
Automatic verification of data-centric business processes
We formalize and study business process systems that are centered around "business artifacts", or simply "artifacts". This approach focuses on data records, kn...
Alin Deutsch, Richard Hull, Fabio Patrizi, Victor ...
ISCI
2007
103views more  ISCI 2007»
14 years 9 months ago
Threshold-based declustering
Declustering techniques reduce query response time through parallel I/O by distributing data among multiple devices. Except for a few cases it is not possible to find declusterin...
Ali Saman Tosun
USENIX
2007
15 years 2 days ago
DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O Prefetch
Current disk prefetch policies in major operating systems track access patterns at the level of the file abstraction. While this is useful for exploiting application-level access...
Xiaoning Ding, Song Jiang, Feng Chen, Kei Davis, X...
ILP
2003
Springer
15 years 3 months ago
Mining Model Trees: A Multi-relational Approach
In many data mining tools that support regression tasks, training data are stored in a single table containing both the target field (dependent variable) and the attributes (indepe...
Annalisa Appice, Michelangelo Ceci, Donato Malerba