Sciweavers

949 search results - page 74 / 190
» Theory of Constraints
Sort
View
INFOSCALE
2007
ACM
15 years 2 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
100
Voted
AGILEDC
2007
IEEE
15 years 7 months ago
Push to Pull: How Lean Concepts Improve a Data Migration
A complex Enterprise Relationship Planning (ERP) data migration was in trouble: low quality, poor performance, instability, and an overworked team threatened project success. Faci...
Rand Bradley
AGP
1999
IEEE
15 years 5 months ago
Comparing expressiveness of set constructor symbols
In this paper we consider the relative expressive power of two very common operators applicable to sets and multisets: the with and the union operators. For such operators we prove...
Agostino Dovier, Carla Piazza, Alberto Policriti
78
Voted
BIRTHDAY
2005
Springer
15 years 6 months ago
Agents with Exact Foreknowledge
Computational experiments are reported involving the concept of foreknowledge, an agent’s direct, unmediated and accurate, but possibly incomplete, awareness of its future includ...
Jim Doran
CVBIA
2005
Springer
15 years 6 months ago
Segmenting Cardiopulmonary Images Using Manifold Learning with Level Sets
Cardiopulmonary imaging is a key tool in modern diagnostic and interventional medicine. Automated analysis of MRI or ultrasound video is complicated by limitations on the image qua...
Qilong Zhang, Robert Pless