210 research outputs found

    Dimension Hierarchy Diagrams

    Get PDF
    There has been explosive growth in the use of data warehousing technology in the construction of decision support infrastructures. Industrial applications have highlighted the dichotomy between on-line transaction processing and data warehousing, with a focus on read- only ad-hoc analysis of business data [Inmon 1992]. Data warehouse development is based on business processes and associated decision-making tasks, and therefore may result in critical information system components. The design and enhancement of important decision-making activities may be a source of competitive advantage. While some traditional transaction processing systems are purchased “off the shelf,” the promise of competitive advantage may favor custom development of some data warehouse components. Therefore, design tools that support technical development and communication with business users are essential

    AX: SEARCHING FOR DATABASE REGULARITIES USING CONCEPT NETWORKS

    Get PDF
    In many organizations, both business and scientific, we collect ever increasing amounts of data using information technology. Indeed, the technology for collecting data has outpaced our ability to analyze and interpret these very large databases. In this paper, we discuss the interaction of heuristic search and domain knowledge in the AX knowledge discovery tool. The search process rests on the use of rule quality measures and the organization of domain knowledge. A small loan application database from the machine learning repository is used to illustrate the process.Information Systems Working Papers Serie

    On Evaluating Knowledge Discovery Tools

    Get PDF

    Using Agent-Based Modelling to Address Malicious Behavior on Social Media

    Get PDF
    In this study we create a platform for evaluating social media policies through simulation. We argue that social media policies need to be tested and refined before they can be successfully applied. We propose agent-based modelling (ABM) as a method for representing both malicious and legitimate social media agents, along with their key behaviors. Our two main research questions are as follows. 1. How do we build an agent-based model of a social media platform to address social media regulation? 2. How can an agent-based simulation approach be used to assess the effectiveness of social media policies? A preliminary agent-based model has been implemented (in Python), using the five human user types (‘amplifier’, ‘broadcaster’, ‘commentator’, ‘influential user’ and ‘viewer’) and two bot types (‘simple’ and ‘sophisticated’). During the simulation, a social media network of 100 agents is created and the agents\u27 behaviors are captured in this paper

    A Visualization of the Internet

    Full text link
    Recent advances in event-driven information and real-time configurations have paved the way for evolutionary programming. In fact, few system administrators would disagree with the robust unification of 802.11 mesh networks and write-ahead logging, which embodies the appropriate principles of hardware and architecture. In this paper we introduce an analysis of the UNIVAC computer (YUX), arguing that Lamport clocks and DHCP are rarely incompatible

    Navigating Workload Compatibility Between a Recommender System and a NoSQL Database: An Interactive Tutorial

    Get PDF
    In this tutorial, the issue of compatibility between a big data storage technology and an analytic workload is explored using a fictitious streaming company as an example. The tutorial offers an interactive approach to help students understand the importance of considering workload compatibility when adopting new technologies. We provide instructors with two Jupyter Notebooks that analyze the compatibility, a detailed instructor guide on how to execute these notebooks, lessons learned, and appendices containing solutions and explanations. This tutorial provides a valuable resource for instructors teaching courses in database systems, big data, and analytic concepts, helping students develop practical skills to navigate the complexities of big data technologies effectively

    An Analysis of Stability of Inter-bank Loan Network: A Simulated Network Approach

    Get PDF
    Research in the domain of Financial Contagion has come to the forefront in recent years. There has been a significant focus on this field since the recession of 2008. In this paper we take a look at simulation based modelling to stress test the stability of inter-bank loan networks of different structures. We look to analyze the effect of various parameters on the stability of these networks. We first simulate networks which are Homogeneous in nature. We then simulate a Heterogeneous (tiered) network. The model also introduces an endogenous loaning mechanism to imitate a more realistic inter bank loan market. We run simulations on these networks to gain a better understanding of the propagation of losses through the network. After studying the results of these simulations we come up with some interesting new insights about how parameters like connectivity and size of the network, effect a tiered intra-bank financial network. One of our key findings is that higher inter-tier connectivity is good for the stability of big banks but not so much for banks of smaller size
    • 

    corecore