Arthritis 发表于 2025-3-23 11:59:52
Models in the Design of Context-Aware Well-Being Applicationsto design . context-aware applications, due to the absence of suitable domain theories that consider dynamic context and associated user requirements as a precursor of system development. In this paper, we discuss a theory for the . domain and propose a model-driven development process that exploits是比赛 发表于 2025-3-23 15:33:30
http://reply.papertrans.cn/71/7013/701228/701228_12.pngHangar 发表于 2025-3-23 19:55:53
http://reply.papertrans.cn/71/7013/701228/701228_13.pngoptional 发表于 2025-3-24 01:40:22
http://reply.papertrans.cn/71/7013/701228/701228_14.pngHla461 发表于 2025-3-24 05:09:50
Model-Based LCA for Sustainable Energy-Production from Olive-Oil Production: An Italian Agriculturaln this paper the case of an Italian power plant fed from biomass (de-oiled pomace and waste wood) is discussed for an agricultural district. The optimal operating conditions are addressed by setting up an information model for the improvement of accuracy of estimation of the potential of biomass fro明确 发表于 2025-3-24 06:39:07
Forecasting Industry Big Data with Holt Winter’s Method from a Perspective of In-Memory Paradigm considerable importance for any planning for an industry as the business profitability revolves around the decisions based on the results of forecasting. This paper tries to explore the situations in the business industry domain which concentrates on the analysis of seasonal time series data usingelucidate 发表于 2025-3-24 11:51:59
http://reply.papertrans.cn/71/7013/701228/701228_17.pngaverse 发表于 2025-3-24 16:33:14
Re-Identification Risk Based Security Controlsble to facilitate data submissions by customers and processing with third parties, among other advantages. But this represents also a potential threat to personal data’s privacy and confidentiality. Even if legal obligations regulate the usage of personal data, for example requiring to disclose them–scent 发表于 2025-3-24 20:00:12
http://reply.papertrans.cn/71/7013/701228/701228_19.pngMITE 发表于 2025-3-25 00:23:26
A Comprehensive Theoretical Framework for Privacy Preserving Distributed OLAPere the experimental validation of the framework has also been reported. Particularly, our framework makes use of the .. as the elementary component for .... Here, we investigate theoretical properties of the . decomposition method, and identify four theoretical extensions of this method, which, acc