Zobrazeno 1 - 10
of 63
pro vyhledávání: '"Omar Boucelma"'
Publikováno v:
Jurnal Sistem Informasi, Vol 5, Iss 2 (2012)
MIT Process Handbook menawarkan metode penyimpanan dan pencarian proses bisnis suatu organisasi. Komunitas bisnis atau mahasiswa yang mengambil topik kuliah proses bisnis dapat mempelajari best-practice proses bisnis yang terdapat dalam MIT Process H
Externí odkaz:
https://doaj.org/article/9b5fd6ffdada4e72af82bcd0b6c1b748
Publikováno v:
New Trends in Database and Information Systems ISBN: 9783031157424
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8b6bb6c3b86ec0e259561d461aa735d9
https://doi.org/10.1007/978-3-031-15743-1_15
https://doi.org/10.1007/978-3-031-15743-1_15
The LNCS journal Transactions on Large-scale Data and Knowledge-centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become
Publikováno v:
Advanced Analytics and Learning on Temporal Data-5th {ECML} {PKDD} Workshop, {AALTD} 2020
Advanced Analytics and Learning on Temporal Data-5th {ECML} {PKDD} Workshop, {AALTD} 2020, Sep 2020, Ghent, Belgium
Advanced Analytics and Learning on Temporal Data-5th Workshop, 2020, Sep 2020, Ghent, Belgium
Advanced Analytics and Learning on Temporal Data ISBN: 9783030657413
AALTD@PKDD/ECML
Advanced Analytics and Learning on Temporal Data-5th {ECML} {PKDD} Workshop, {AALTD} 2020, Sep 2020, Ghent, Belgium
Advanced Analytics and Learning on Temporal Data-5th Workshop, 2020, Sep 2020, Ghent, Belgium
Advanced Analytics and Learning on Temporal Data ISBN: 9783030657413
AALTD@PKDD/ECML
IoT data, that most often carry a temporal dimension, can be exploited from an analysis perspective or from a forecasting one. In this paper, we propose a predictive approach to address the problem of data trustworthiness in a data stream generated b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::beccc2593183a1721383df2349455537
https://hal.science/hal-03173412/file/Camera_Version_AALDT.pdf
https://hal.science/hal-03173412/file/Camera_Version_AALDT.pdf
Publikováno v:
ECML PKDD 2020 Workshops ISBN: 9783030659646
PKDD/ECML Workshops
PKDD/ECML Workshops
In the Transportation and Logistics (TL) industry, address validation is crucial. Indeed, due to the huge number of parcel shipments that are moving worldwide everyday, incorrect addresses generates several shipment returns, leading to useless financ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d9eea55d08ff20b8767dab5f1ee53c37
https://doi.org/10.1007/978-3-030-65965-3_21
https://doi.org/10.1007/978-3-030-65965-3_21
Autor:
Omar Boucelma
Publikováno v:
Semantic Keyword-Based Search on Structured Data Sources
Semantic Keyword-Based Search on Structured Data Sources, 10546, Springer International Publishing, pp.224-229, 2018, Lecture Notes in Computer Science, ⟨10.1007/978-3-319-74497-1_22⟩
Semantic Keyword-Based Search on Structured Data Sources ISBN: 9783319744964
International KEYSTONE Conference
Semantic Keyword-Based Search on Structured Data Sources, 10546, Springer International Publishing, pp.224-229, 2018, Lecture Notes in Computer Science, ⟨10.1007/978-3-319-74497-1_22⟩
Semantic Keyword-Based Search on Structured Data Sources ISBN: 9783319744964
International KEYSTONE Conference
User Interaction WG investigates issues related to the semantic disambiguation of the queries based on the context and on the keyword annotations with respect to some reference ontologies, the development of languages for keyword searching and the us
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c48263da7c145d0a9f86605f2396a132
https://hal.science/hal-03605476
https://hal.science/hal-03605476
Publikováno v:
Semantic Keyword-Based Search on Structured Data Sources ISBN: 9783319744964
International KEYSTONE Conference
Semantic Keyword-Based Search on Structured Data Sources-Third International KEYSTONE Conference, IKC 2017
Semantic Keyword-Based Search on Structured Data Sources-Third International KEYSTONE Conference, IKC 2017, Sep 2017, Gdańsk, Poland
Third International KEYSTONE Conference (IKC 2017)
Third International KEYSTONE Conference (IKC 2017), Sep 2017, Gdansk, Poland
International KEYSTONE Conference
Semantic Keyword-Based Search on Structured Data Sources-Third International KEYSTONE Conference, IKC 2017
Semantic Keyword-Based Search on Structured Data Sources-Third International KEYSTONE Conference, IKC 2017, Sep 2017, Gdańsk, Poland
Third International KEYSTONE Conference (IKC 2017)
Third International KEYSTONE Conference (IKC 2017), Sep 2017, Gdansk, Poland
International audience; —In this paper, we present a Linked ecosystem of Web services where both Web services, mashups and users are represented as a multigraph structure. For illustration and experimental purposes, a graph has been constructed , i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6831e09ef74cc57eb51b5ea27be775fd
https://doi.org/10.1007/978-3-319-74497-1_9
https://doi.org/10.1007/978-3-319-74497-1_9
Publikováno v:
The 12th International Conference for Internet Technology and Secured Transactions ICITST 2017
The 12th International Conference for Internet Technology and Secured Transactions ICITST 2017, Dec 2017, Cambridge, United Kingdom
ICITST
The 12th International Conference for Internet Technology and Secured Transactions ICITST 2017, Dec 2017, Cambridge, United Kingdom. 2017
The 12th International Conference for Internet Technology and Secured Transactions ICITST 2017, Dec 2017, Cambridge, United Kingdom
ICITST
The 12th International Conference for Internet Technology and Secured Transactions ICITST 2017, Dec 2017, Cambridge, United Kingdom. 2017
International audience; —Cloud Computing technology is gaining momentum, however security concerns remain one of the top barrier to cloud projects. We propose a framework that ensures data control and privacy in the cloud by using traceability (aka
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::19ed8858ce0de06be93d274170b7c4c8
https://hal.archives-ouvertes.fr/hal-01787036/file/icitst17.pdf
https://hal.archives-ouvertes.fr/hal-01787036/file/icitst17.pdf
Publikováno v:
MobiQuitous 2017: Computing, Networking and Services
MobiQuitous 2017: Computing, Networking and Services, Nov 2017, Melbourne VIC Australia, Australia. pp.529-530, ⟨10.1145/3144457.3144513⟩
MobiQuitous
MobiQuitous 2017: Computing, Networking and Services, Nov 2017, Melbourne VIC Australia, Australia. pp.529-530, ⟨10.1145/3144457.3144513⟩
MobiQuitous
With the advent of mobiquitous technologies, security became a critical concern for digital services providers who wish to control access to their resources deployed in distributed and mobile environments. Traditional access control methods are no lo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9f35edf036707ab4576c1ab5fc0823ea
https://hal.science/hal-03605451
https://hal.science/hal-03605451
Publikováno v:
HPCS
2017 International Conference on High Performance Computing & Simulation (HPCS)
2017 International Conference on High Performance Computing & Simulation (HPCS), Jul 2017, Genoa, France. pp.74-78, ⟨10.1109/HPCS.2017.22⟩
2017 International Conference on High Performance Computing & Simulation (HPCS)
2017 International Conference on High Performance Computing & Simulation (HPCS), Jul 2017, Genoa, France. pp.74-78, ⟨10.1109/HPCS.2017.22⟩
Integrity constraints (ICs) such as Functional Dependencies (FDs) or Inclusion Dependencies (INDs) are commonly used in databases to check if input relations obey to certain pre-defined quality metrics. While Data-Intensive Scalable Computing (DISC)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::382940926516592bf88b8bcfd1fa6e81
https://hdl.handle.net/11380/1149198
https://hdl.handle.net/11380/1149198