Arthritis 发表于 2025-3-23 11:59:52

Models in the Design of Context-Aware Well-Being Applicationsto design . context-aware applications, due to the absence of suitable domain theories that consider dynamic context and associated user requirements as a precursor of system development. In this paper, we discuss a theory for the . domain and propose a model-driven development process that exploits

是比赛 发表于 2025-3-23 15:33:30

http://reply.papertrans.cn/71/7013/701228/701228_12.png

Hangar 发表于 2025-3-23 19:55:53

http://reply.papertrans.cn/71/7013/701228/701228_13.png

optional 发表于 2025-3-24 01:40:22

http://reply.papertrans.cn/71/7013/701228/701228_14.png

Hla461 发表于 2025-3-24 05:09:50

Model-Based LCA for Sustainable Energy-Production from Olive-Oil Production: An Italian Agriculturaln this paper the case of an Italian power plant fed from biomass (de-oiled pomace and waste wood) is discussed for an agricultural district. The optimal operating conditions are addressed by setting up an information model for the improvement of accuracy of estimation of the potential of biomass fro

明确 发表于 2025-3-24 06:39:07

Forecasting Industry Big Data with Holt Winter’s Method from a Perspective of In-Memory Paradigm considerable importance for any planning for an industry as the business profitability revolves around the decisions based on the results of forecasting. This paper tries to explore the situations in the business industry domain which concentrates on the analysis of seasonal time series data using

elucidate 发表于 2025-3-24 11:51:59

http://reply.papertrans.cn/71/7013/701228/701228_17.png

averse 发表于 2025-3-24 16:33:14

Re-Identification Risk Based Security Controlsble to facilitate data submissions by customers and processing with third parties, among other advantages. But this represents also a potential threat to personal data’s privacy and confidentiality. Even if legal obligations regulate the usage of personal data, for example requiring to disclose them

–scent 发表于 2025-3-24 20:00:12

http://reply.papertrans.cn/71/7013/701228/701228_19.png

MITE 发表于 2025-3-25 00:23:26

A Comprehensive Theoretical Framework for Privacy Preserving Distributed OLAPere the experimental validation of the framework has also been reported. Particularly, our framework makes use of the .. as the elementary component for .... Here, we investigate theoretical properties of the . decomposition method, and identify four theoretical extensions of this method, which, acc
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: On the Move to Meaningful Internet Systems: OTM 2014 Workshops; Confederated Interna Robert Meersman,Hervé Panetto,Henry Chan Conference pr