Sciweavers

565 search results - page 89 / 113
» A Study on Successful Business Intelligence Systems in Pract...
Sort
View
ISICA
2009
Springer
15 years 8 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
ATAL
2009
Springer
15 years 8 months ago
Hedonic coalition nets
In hedonic games, players have the opportunity to form coalitions, and have preferences over the coalitions they might join. Such games can be used to model a variety of settings ...
Edith Elkind, Michael Wooldridge
MOBILWARE
2009
ACM
15 years 8 months ago
Pervasive Adaptation in Car Crowds
Abstract. Advances in the miniaturization and embedding of electronics for microcomputing, communication and sensor/actuator systems, have fertilized the pervasion of technology in...
Alois Ferscha, Andreas Riener
JKM
2007
161views more  JKM 2007»
15 years 1 months ago
A strategy-based ontology of knowledge management technologies
Purpose – The purpose of this paper is to distinguish and describe knowledge management (KM) technologies according to their support for strategy. Design/methodology/approach â€...
Andre Saito, Katsuhiro Umemoto, Mitsuru Ikeda
AI
2009
Springer
15 years 8 months ago
Opinion Learning without Emotional Words
This paper shows that a detailed, although non-emotional, description of event or an action can be a reliable source for learning opinions. Empirical results show the practical uti...
Marina Sokolova, Guy Lapalme