Sciweavers

1024 search results - page 140 / 205
» Value complete, column complete, predicate complete
Sort
View
ADC
2004
Springer
106views Database» more  ADC 2004»
15 years 5 months ago
Customizing Internal Activity Behaviour for Flexible Process Enforcement
Workflow technology has met with success in a variety of industries, although several limitations have emerged. One such drawback is the inflexibility of specification languages, ...
Belinda M. Carter, Joe Y.-C. Lin, Maria E. Orlowsk...
ATAL
2004
Springer
15 years 5 months ago
The Advantages of Compromising in Coalition Formation with Incomplete Information
This paper presents protocols and strategies for coalition formation with incomplete information under time constraints. It focuses on strategies for coalition members to distribu...
Sarit Kraus, Onn Shehory, Gilad Taase
BIRTHDAY
2004
Springer
15 years 5 months ago
Communicating Mobile Processes
This paper presents a new model for mobile processes in occam-π. A process, embedded anywhere in a dynamically evolving network, may suspend itself mid-execution, be safely discon...
Peter H. Welch, Fred R. M. Barnes
CASDMKM
2004
Springer
144views Data Mining» more  CASDMKM 2004»
15 years 5 months ago
Knowledge-Information Circulation Through the Enterprise: Forward to the Roots of Knowledge Management
The field of Knowledge Management (KM) has already completed its initiatory phase, characterized by operational confusion between knowledge and information, stemming from the tenuo...
Milan Zeleny
PSD
2004
Springer
126views Database» more  PSD 2004»
15 years 5 months ago
Outlier Protection in Continuous Microdata Masking
Abstract. Masking methods protect data sets against disclosure by perturbing the original values before publication. Masking causes some information loss (masked data are not exact...
Josep Maria Mateo-Sanz, Francesc Sebé, Jose...