Sciweavers

834 search results - page 140 / 167
» Analyzing Harmonic Monitoring Data Using Data Mining
Sort
View
VIZSEC
2005
Springer
15 years 3 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
CORR
2008
Springer
123views Education» more  CORR 2008»
14 years 9 months ago
Optimizing Web Sites for Customer Retention
With customer relationship management (CRM) companies move away from a mainly product-centered view to a customer-centered view. Resulting from this change, the effective manageme...
Michael Hahsler
96
Voted
CCECE
2006
IEEE
15 years 3 months ago
A QoS Mapping Rule Builder
Although many QoS management architectures have been recently introduced with a lot of advanced features, they have never been widely used in the existing applications due to the ...
Kim Khoa Nguyen, Brigitte Kerhervé, Brigitt...
IJVR
2008
118views more  IJVR 2008»
14 years 9 months ago
HERA: Learner Tracking in a Virtual Environment
The main goals of using simulations and Virtual Environments for Training/Learning (VET/L) are to avoid risks and unwanted consequences, to reduce training costs, and to promote tr...
Kahina Amokrane, Domitile Lourdeaux, Jean-Marie Bu...
TKDE
2008
146views more  TKDE 2008»
14 years 9 months ago
Toward Managing Uncertain Spatial Information for Situational Awareness Applications
Situational awareness (SA) applications monitor the real world and the entities therein to support tasks such as rapid decision making, reasoning, and analysis. Raw input about unf...
Yiming Ma, Dmitri V. Kalashnikov, Sharad Mehrotra