Search Results

1 - 10 of 169 items :

  • Information Technology x
  • Computer Sciences x
Clear All
Database Concepts in a Domain Ontology

. Skjæveland, et al., “Ontology Based Data Access in Statoil,” Web Semantics: Science, Services and Agents on the World Wide Web, Jul. 2017. [4] N. Konstantinou, D.-E. Spanos and N. Mitrou, “Ontology and database mapping: a survey of current implementations and future directions,” Journal of Web Engineering, vol. 7, no. 1, pp. 1-24, March 2008. [5] D. Calvanese, B. Cogrel, S. Komla-Ebri, R. Kontchakov, D. Lanti, M. Rezk, M. Rodriguez-Muro, and G. Xiao, “Ontop: Answering SPARQL queries over

Open access
Valuation of European Call Option via Inverse Fourier Transform

.51002 [11] P. Carr and D. Madan, “Option valuation using the fast Fourier transform,” The Journal of Computational Finance, vol. 2, no. 4, pp. 61-73, 1999. [12] M. Karanasos and J. Kim, “A re-examination of the asymmetric power ARCH model,” Journal of Empirical Finance, vol. 13, no. 1, pp. 113-128, Jan. 2006. [13] O. Alexandrov, Composite trapezoidal rule illustration. 2007. [Online]. Available:

Open access
Development of Ontological Knowledge Model for Raw Materials Management Task/ Ontoloģiskā zināšanu modeļa izstrāde izejvielu pārvaldības uzdevumam Построение онтологической модели знаний для задачи управления материальными ресурсами

References [1] WiseGEEK, [Online] Available: [2] N. F. Noy, D. L. McGuinness, “Ontology Development 101: A Guide to Creating Your First Ontology,” Stanford Knowledge Systems Laboratory Technical Rep. KSL-01-05 and Stanford Medical Informatics Technical Rep. SMI-2001-0880, 2001. [3] Wand [Online] Available: [4] T. Gruber, “A translation approach to portable ontology specifications,” Knowledge

Open access
A Case Study: Software Defect Root Causes

[Online]. Aviable: [6] D. N. Card, “Learning from Our Mistakes with Defect Causal Analysis,” IEEE Software, vol. 15, no. 1, pp. 56-63, 1998. [7] S. Li, H. Zhou, T. Xiao, H. Lin, W. Lin, and T. Xie, “A characteristic study on failures of production distributed data-parallel programms,” Proceeding of the 2013 International Conference on Software Engineering, p. 963-972, 2013.

Open access
Approaches to the Creation of Behavioural Patterns of Information System Users

References [1] Infected User Behavioral Modeling for Cyber Defense Exercises: Part I URL Last accessed 2012.05.12 [2] Laskey, K.B., Alghamdi, G., Wang, X., Barbara, D., Shackleford, T., Wright, E., and Fitzgerald, J., Detecting Threatening Behavior Using Bayesian Networks, Proceedings of the Conference on Behavioral Representation in Modeling and Simulation, 2004. [3] The Eighth Annual CSI/FBI 2003 report: Computer Crime and

Open access
Evaluation of Payoff Matrices for Non-Cooperative Games via Processing Binary Expert Estimations

, “Selective games on binary relations,” Topology and its Applications, vol. 192, pp. 58-83, 2015. [7] V. Knoblauch, “A simple voting scheme generates all binary relations on finite sets,” Journal of Mathematical Economics, vol. 49, iss. 3, pp. 230-233, 2013. [8] H. Ichihashi and I. B. Türksen, “A neuro-fuzzy approach to data analysis of pairwise comparisons,” International Journal of Approximate Reasoning, vol. 9, iss. 3, pp. 227-248, 1993. https

Open access
Data Analysis of Cybercrimes in Businesses

References [1] T. Agarwal, D. Henry and J. Finkle, “JPMorgan hack exposed data of 83 million, among biggest breaches in history,” 2014 [Online]. Available: [2] Bureau of Justice Statistics, “Data Collection: National Computer Security Survey (NCSS),” [Online]. Available: [3] D. Chaikin, “Network Investigations of Cyber Attacks: The Limits of Digital Evidence

Open access
Markov Chains in the Task of Author’s Writing Style Profile Construction/ Markova ķēžu pielietošanas iespēju izpēte autora stila identifikācijai/ Исследование возможностей применения Марковских цепей для идентификации авторского стиля

References [1] P. A. Osipov and A. N. Borisov, “Abnormal action detection based on Markov models”, in Automatic Control and Computer Sciences, vol. 45, no. 2. 2011, pp. 94-105. [2] The GraphML File Format. [Online]. Available: [Accessed 05 July, 2014]. [3] M. S. Elayidom, C. Jose et al, “Text classification for authorship attribution analysis”, in Advanced Computing: An International Journal, ACIJ, vol. 4, no. 5, Sep. 2013, 10 p

Open access
Data Analytics in CRM Processes: A Literature Review

-323, 2017. [4] J.Markarian, S. Brobst and J. Bedell, Critical Success Factors Deploying Pervasive BI, 2007 [Online]. Available: [5] E. W. T. Ngai, L. Xiu, and D. C. K. Chau, “Application of Data Mining Techniques in Customer Relationship Management: A Literature Review and Classification,” Expert Systems with Applications, vol. 36, no. 2, pp. 2592-2602, Mar. 2009.

Open access
Transport Simulation Model Calibration with Two-Step Cluster Analysis Procedure

REFERENCES [1] D. D.Q. Duong, F. F. Saccomanno and B. R. Hellinga, Calibration of microscopic traffic model for simulating safety performance, Compendium of papers of the 89th Annual TRB Conference , Jan. 10–14, 2010, Washington, DC. TRB 2010. [2] L. Vasconcelos, Á. Seco and A. B. Silva, Hybrid calibration of microscopic simulation models, EWGT2013 – 16th Meeting of the EURO Working Group on Transportation, Social and Behavioral Sciences Procedia , 2013. Springer International Publishing Switzerland, 2014. [3] M. Treiber and A. Kesting

Open access