找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: On the Move to Meaningful Internet Systems: OTM 2014 Workshops; Confederated Interna Robert Meersman,Hervé Panetto,Henry Chan Conference pr

[复制链接]
楼主: 漠不关心
发表于 2025-3-23 11:59:52 | 显示全部楼层
Models in the Design of Context-Aware Well-Being Applicationsto design . context-aware applications, due to the absence of suitable domain theories that consider dynamic context and associated user requirements as a precursor of system development. In this paper, we discuss a theory for the . domain and propose a model-driven development process that exploits
发表于 2025-3-23 15:33:30 | 显示全部楼层
发表于 2025-3-23 19:55:53 | 显示全部楼层
发表于 2025-3-24 01:40:22 | 显示全部楼层
发表于 2025-3-24 05:09:50 | 显示全部楼层
Model-Based LCA for Sustainable Energy-Production from Olive-Oil Production: An Italian Agriculturaln this paper the case of an Italian power plant fed from biomass (de-oiled pomace and waste wood) is discussed for an agricultural district. The optimal operating conditions are addressed by setting up an information model for the improvement of accuracy of estimation of the potential of biomass fro
发表于 2025-3-24 06:39:07 | 显示全部楼层
Forecasting Industry Big Data with Holt Winter’s Method from a Perspective of In-Memory Paradigm considerable importance for any planning for an industry as the business profitability revolves around the decisions based on the results of forecasting. This paper tries to explore the situations in the business industry domain which concentrates on the analysis of seasonal time series data using
发表于 2025-3-24 11:51:59 | 显示全部楼层
发表于 2025-3-24 16:33:14 | 显示全部楼层
Re-Identification Risk Based Security Controlsble to facilitate data submissions by customers and processing with third parties, among other advantages. But this represents also a potential threat to personal data’s privacy and confidentiality. Even if legal obligations regulate the usage of personal data, for example requiring to disclose them
发表于 2025-3-24 20:00:12 | 显示全部楼层
发表于 2025-3-25 00:23:26 | 显示全部楼层
A Comprehensive Theoretical Framework for Privacy Preserving Distributed OLAPere the experimental validation of the framework has also been reported. Particularly, our framework makes use of the .. as the elementary component for .... Here, we investigate theoretical properties of the . decomposition method, and identify four theoretical extensions of this method, which, acc
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-24 21:19
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表