Sciweavers

2826 search results - page 143 / 566
» A resource-based analysis of IT sourcing
Sort
View
135
Voted
SADFE
2008
IEEE
15 years 8 months ago
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model
This research builds on our method for validating syslog entries proposed in [5]. The goal of the proposed method is to allow syslog files to be forensically viable. The goal with...
Steena Dominica Steven Monteiro, Robert F. Erbache...
IPPS
2007
IEEE
15 years 8 months ago
A Combinatorial Analysis of Distance Reliability in Star Network
This paper addresses a constrained two-terminal reliability measure referred to as Distance Reliability (DR) between the source node u and the destination node I with the shortest...
Xiaolong Wu, Shahram Latifi, Yingtao Jiang
121
Voted
PG
2007
IEEE
15 years 8 months ago
Faceting Artifact Analysis for Computer Graphics
The faceting signal, defined in this paper as the difference signal between a rendering of the original geometric model and a simplified version of the geometric model, is respo...
Lijun Qu, Gary W. Meyer
133
Voted
AUSDM
2007
Springer
121views Data Mining» more  AUSDM 2007»
15 years 8 months ago
Using Corpus Analysis to Inform Research into Opinion Detection in Blogs
Opinion detection research relies on labeled documents for training data, either by assumptions based on the document’s origin or by using human assessors to categorise the docu...
Deanna J. Osman, John Yearwood, Peter Vamplew
KES
2007
Springer
15 years 8 months ago
Analysis of the Relation Between Stock Price Returns and Headline News Using Text Categorization
Abstract. In this paper, we analyze about the relation between stock price returns and Headline News. Headline News is very important sources of information in asset management, an...
Satoru Takahashi, Masakazu Takahashi, Hiroshi Taka...