Sciweavers

549 search results - page 45 / 110
» Belief-Based Risk Analysis
Sort
View
PAKDD
2004
ACM
199views Data Mining» more  PAKDD 2004»
15 years 5 months ago
Temporal Sequence Associations for Rare Events
In many real world applications, systematic analysis of rare events, such as credit card frauds and adverse drug reactions, is very important. Their low occurrence rate in large da...
Jie Chen, Hongxing He, Graham J. Williams, Huidong...
ICEIS
2002
IEEE
15 years 4 months ago
The AEX Method and Its Instrumentation
: We aim at elaborating a decision support system to manage concrete experience, using Artificial Intelligence methods, such as Case-Based Reasoning. We target any organization tha...
Sabine Delaître, Alain Giboin, Sabine Moisan
DIM
2009
ACM
15 years 4 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
WSC
2007
15 years 2 months ago
Simulation of adaptive project management analytics
Typically, IT projects are delivered over-budget and behind schedule. In this paper, we explore the effects of common project management practices that contribute to these problem...
Léa Amandine Deleris, Sugato Bagchi, Shubir...
ECIS
2001
15 years 1 months ago
Avoiding Failure in SPI Initiation
Software Process Improvement (SPI) is a recognised systematic approach for improving the capability of software organisations. Such initiatives have met with a number of difficult...
Pouya Pourkomeylian