Search

Showing total 970 results

Search Constraints

Start Over You searched for: Journal information systems Remove constraint Journal: information systems Database Academic Search Index Remove constraint Database: Academic Search Index
970 results

Search Results

9. Electricity behaviors anomaly detection based on multi-feature fusion and contrastive learning.

10. Making cyber-human systems smarter.

11. PathEL: A novel collective entity linking method based on relationship paths in heterogeneous information networks.

12. Heart failure prognosis prediction: Let's start with the MDL-HFP model.

13. TRGST: An enhanced generalized suffix tree for topological relations between paths.

14. ArZiGo: A recommendation system for scientific articles.

15. Secure multi-dimensional data retrieval with access control and range query in the cloud.

16. Process Query Language: Design, Implementation, and Evaluation.

17. Special issue: Selected papers of BPM 2012.

18. Process-related user interaction logs: State of the art, reference model, and object-centric implementation.

19. Read-safe snapshots: An abort/wait-free serializable read method for read-only transactions on mixed OLTP/OLAP workloads.

20. Big data analytics deep learning techniques and applications: A survey.

21. Reproducible experiments for generating pre-processing pipelines for AutoETL.

22. Reproducible experiments with Learned Metric Index Framework.

23. Information server for highly-connected cross-media publishing

24. Business process simulation: Probabilistic modeling of intermittent resource availability and multitasking behavior.

25. Temporal graph processing in modern memory hierarchies.

26. Proactive conformance checking: An approach for predicting deviations in business processes.

27. Data Lakehouse: A survey and experimental study.

28. Tri-AL: An open source platform for visualization and analysis of clinical trials.

29. A universal approach for simplified redundancy-aware cross-model querying.

30. An incremental algorithm for repairing denial constraint violations.

31. Unveiling the causes of waiting time in business processes from event logs.

32. SFTe: Temporal knowledge graphs embedding for future interaction prediction.

33. An efficient approach for discovering Graph Entity Dependencies (GEDs).

34. Detecting the adversarially-learned injection attacks via knowledge graphs.

35. FDM: Effective and efficient incident detection on sparse trajectory data.

36. DOLAP data warehouse research over two decades: Trends and challenges.

37. Approximate OLAP of document-oriented databases: A variety-aware approach.

38. Blockchain technology for requirement traceability in systems engineering.

39. Cube query interestingness: Novelty, relevance, peculiarity and surprise.

40. An improved context-aware weighted matrix factorization algorithm for point of interest recommendation in LBSN.

41. Repairing raw metadata for metadata management.

42. Efficiently using contextual influence to recommend new items to ephemeral groups.

43. A modular approach to the specification and management of time duration constraints in BPMN.

44. On the reproducibility of experiments of indexing repetitive document collections.

45. From BPMN process models to DMN decision models.

46. Approaches and challenges of privacy preserving search over encrypted data.

47. Knowledge triple mining via multi-task learning.

48. A framework for modeling, executing, and monitoring hybrid multi-process specifications with bounded global–local memory.

49. A large reproducible benchmark on text classification for the legal domain based on the ECHR-OD repository.

50. Process fragments discovery from emails: Functional, data and behavioral perspectives discovery.