Sciweavers

23 search results - page 3 / 5
» Transactional Intent
Sort
View
ACSAC
2006
IEEE
13 years 11 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
JASIS
2010
170views more  JASIS 2010»
13 years 3 months ago
Analyzing URL queries
This study investigated a relatively unexamined query type, queries composed of URLs. The extent, variation and user click-through behavior was examined to determine the intent be...
Wei Meng Lee, Mark Sanderson
WEBI
2005
Springer
13 years 10 months ago
Guidance Performance Indicator - Web Metrics for Information Driven Web Sites
For the evaluation of web sites a multitude of metrics are available. Apart from general statistical measures, success metrics reflect the degree to which a web site achieves its...
Carsten Stolz, Maximilian Viermetz, Michal Skubacz...
WINE
2005
Springer
184views Economy» more  WINE 2005»
13 years 10 months ago
A Comparative Study on Marketing Mix Models for Digital Products
The rise of the Internet and electronic commerce provide a huge marketspace and unique transaction process for digital products. It is significant to discuss whether established m...
Kanliang Wang, Yuan Wang, Jingtao Yao
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
13 years 9 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock