Sciweavers

374 search results - page 58 / 75
» Towards Translating Graph Transformation Approaches by Model...
Sort
View
DOLAP
2009
ACM
15 years 6 months ago
A taxonomy of ETL activities
Extract-Transform-Load (ETL) activities are software modules responsible for populating a data warehouse with operational data, which have undergone a series of transformations on...
Panos Vassiliadis, Alkis Simitsis, Eftychia Baikou...
AUTOMATICA
2006
94views more  AUTOMATICA 2006»
14 years 11 months ago
Subspace identification for FDI in systems with non-uniformly sampled multirate data
This paper proposes a novel subspace approach towards direct identification of a residual model for fault detection and isolation (FDI) in a system with non-uniformly sampled mult...
Weihua Li, Zhengang Han, Sirish L. Shah
103
Voted
BMCBI
2010
233views more  BMCBI 2010»
14 years 11 months ago
Odefy -- From discrete to continuous models
Background: Phenomenological information about regulatory interactions is frequently available and can be readily converted to Boolean models. Fully quantitative models, on the ot...
Jan Krumsiek, Sebastian Pölsterl, Dominik M. ...
GECCO
2010
Springer
150views Optimization» more  GECCO 2010»
15 years 4 months ago
Towards drift correction in chemical sensors using an evolutionary strategy
Gas chemical sensors are strongly affected by the so-called drift, i.e., changes in sensors’ response caused by poisoning and aging that may significantly spoil the measures g...
Stephano Di Carlo, Ernesto Sánchez, Alberto...
CCS
2003
ACM
15 years 4 months ago
Formal access control analysis in the software development process
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Manuel Koch, Francesco Parisi-Presicce