Sciweavers

89 search results - page 16 / 18
» Data integration flows for business intelligence
Sort
View
EEE
2004
IEEE
13 years 9 months ago
e-Transformation Technologies: Case Studies and the Road Ahead - A Value Chain Perspective
e-Transformation technologies, for the past few years, have been evolving towards the goal of information integration and system interoperability. While there is no doubt that int...
William Kwok-Wai Cheung
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
13 years 3 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...
CIA
2008
Springer
13 years 7 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
UMUAI
2008
192views more  UMUAI 2008»
13 years 5 months ago
Automatic detection of learner's affect from conversational cues
We explored the reliability of detecting a learner's affect from conversational features extracted from interactions with AutoTutor, an intelligent tutoring system that helps...
Sidney K. D'Mello, Scotty D. Craig, Amy M. Withers...
IAT
2008
IEEE
13 years 5 months ago
Structured Learning of Component Dependencies in AmI Systems
As information and communication technologies are becoming an integral part of our homes, the demand for AmI systems with assistive functionality is increasing. A great effort has...
Todor Dimitrov, Josef Pauli, Edwin Naroska, Christ...