Now showing items 851-870 of 1798

    • Kappa-Join: Efficient Execution of Existential Quantification in XML Query Languages 

      Brantner, M; Helmer, S; Kanne, CC; Moerkotte, G (Springer, 2006)
      XML query languages feature powerful primitives for formulating queries, involving comparison expressions which are existentially quantified. If such comparisons involve several scopes, they are correlated and, thus, become ...
    • Key Challenges in Early-Stage Software Startups 

      Giardino C; Bajwa SS; Wang X; Abrahamsson P (Springer, 2015)
      Software startups are newly created companies designed to grow fast. The uncertainty of new markets and development of cutting-edge technologies pose challenges different from those faced by more mature companies. In this ...
    • Key challenges in software startups across life cycle stages 

      Wang X; Edison H; Bajwa S; Giardino C; Abrahamsson P (Springer, 2016)
      Software startups are challenging endeavours, with various road blocks on their path to success. The current understanding of the challenges that software startups may encounter is very limited. In this paper, we use the ...
    • KI 2015: Advances in Artificial Intelligence : 38th Annual German Conference on AI, Dresden, Germany, September 21-25, 2015, Proceedings 

      Hölldobler, S; Krötzsch, M; Peñaloza, R; Rudolph, S (Springer, 2015)
      This book constitutes the refereed proceedings of the 38th Annual German Conference on Artificial Intelligence, KI 2015, held in Dresden, Germany, in September 2015. The 15 revised full technical papers presented together ...
    • KISS MIR: Keep It Semantic and Social Music Information Retrieval 

      Dridi, A; Kacimi, M (KDIR, 2015)
      While content-based approaches for music information retrieval (MIR) have been heavily investigated, user- centric approaches are still in their early stage. Existing user-centric approaches use either music-context or ...
    • Knowledge Base Exchange: The Case of OWL 2 QL 

      Arenas M; Botoeva E; Calvanese D; Ryzhikov V (2016)
      In this article, we define and study the problem of exchanging knowledge between a source and a target knowledge base (KB), connected through mappings. Differently from the traditional database exchange setting, which ...
    • Knowledge Base Exchange: The Case of OWL 2 QL 

      Arenas M; Botoeva E; Calvanese D; Ryzhikov V (2016)
      In this article, we define and study the problem of exchanging knowledge between a source and a target knowledge base (KB), connected through mappings. Differently from the traditional database exchange setting, which ...
    • Knowledge engineering for configuration systems 

      Friedrich G; Jannach D; Stumptner M; Zanker M (Elsevier, 2014)
      Developing a product configuration system is a non-trivial and challenging task for various reasons. First, the domain knowledge which has to be encoded into the system is often spread over several departments or functions ...
    • Knowledge-based identification of music suited for places of interest 

      Kaminskas M; Fernández-Tobías I; Ricci F; Cantador I (2014)
      Place is a notion closely linked with the wealth of human experience, and invested by values, attitudes, and cultural influences. In particular, many places are strongly related to music, which contributes to shaping the ...
    • Knowledge-enriched Data Management 

      Calvanese D (Schloss Dagstuhl, 2016)
      The working group identified four important practical challenges: 1. Develop personalized and context-aware data access and management tools. Data in this case is highly heterogenous, multi-model and multi-modal. Here we ...
    • Konzepte zur flexiblen Konfiguration von Finanzdienstleistungen 

      Felfernig, A; Mehlau, J; Wimmer, A; Zanker, M; Russ, C (2004)
      Integriertes Kundenmanagement über alle Vertriebskanäle hinweg und die Steigerung der Kundenzufriedenheit durch spezifische kundenindividuelle Beratung und Leistungserstellung sind zentrale Ansätze von Finanzdienstleistern, ...
    • L'Extreme apprenticeship funziona davvero 

      Dodero, G; Barazzuol, L; Bersanetti, A; Bolliri, S; Caruso, B; Ferrante, A; Inguanta, CS; Osti, R; Saba, G; Serra, A; Zanon, P; Del Fatto, V (AICA, 2015)
      Il lavoro sintetizza diverse esperienze di insegnamento dell’Informatica nelle Province Autonome di Trento e Bolzano. Caratteristica comune alle esperienze è l’utilizzo della metodologia didattica “Extreme Apprenticeship”. ...
    • La sostenibilità come elemento fondamentale di valore nelle fasi preliminari della progettazione 

      Maccioni L; Borgianni Y (Politecnico di Milano, 2017)
      La produzione ed il consumo di massa, guidati unicamente da fattori economici, hanno avuto effetti negativi sulle sfere sociali ed ambientali. La necessità di implementare nuove strategie di innovazione rivolte ad orientare ...
    • Labeling the Frames of a Video Stream with Interval Events 

      Persia F; Bettini F; Helmer S (IEEE, 2017)
      We propose a framework for detecting medium-level events referring to intervals of frames of a video stream. The detected events can serve as input for an earlier developed framework detecting high-level surveillance events. ...
    • Landfill: An Open Dataset of Code Smells with Public Evaluation 

      Palomba F; Di Nucci D; Tufano M; Bavota G; Oliveto R; Poshyvanyk D; De Lucia A (IEEE, 2015)
      Code smells are symptoms of poor design and implementation choices that may hinder code comprehension and possibly increase change- and fault-proneness of source code. Several techniques have been proposed in the literature ...
    • Language-independent clone detection applied to plagiarism detection 

      Brixtel R; Fontaine M; Lesner B; Bazin C; Robbes R (IEEE Computer Society, 2010)
      Clone detection is usually applied in the context of detecting small-to medium scale fragments of duplicated code in large software systems. In this paper, we address the problem of clone detection applied to plagiarism ...
    • A Large-Scale Empirical Study on Self-Admitted Technical Debt 

      Bavota G; Russo B (ACM, 2016)
      Technical debt is a metaphor introduced by Cunningham to indicate "not quite right code which we postpone making it right". Examples of technical debt are code smells and bug hazards. Several techniques have been proposed ...
    • Layered change log model: bridging between ontology change representation and pattern mining 

      Javed M; Abgaz YM; Pahl C (Inderscience, 2014)
      To date, no ontology change management system exists that records the ontology changes based on the different levels of granularity. Once changes are performed using elementary level change operations, they are recorded ...
    • A layered framework for pattern-based ontology evolution 

      Javed M; Abgaz YM; Pahl C ([s.n.], 2011)
      The challenge of ontology-driven modelling of information components is well known in both academia and industry. In this paper, we present a novel approach to deal with customisation and abstraction of ontology-based model ...
    • Layered patterns in modelling and transformation of service-based software architectures 

      Barrett R; Pahl C (Springer, 2006)
      Service-oriented architecture is a recent paradigm for architectural design. The software engineering aspects in this context, that have not been sufficiently addressed, are software evolution and software migration. ...