Sciweavers

1581 search results - page 210 / 317
» Competitive intelligence process and tools for intelligence ...
Sort
View
KDD
1999
ACM
147views Data Mining» more  KDD 1999»
15 years 7 months ago
Text Mining: Finding Nuggets in Mountains of Textual Data
Text mining appliesthe sameanalytical functions of datamining to the domainof textual information, relying on sophisticatedtext analysis techniques that distill information from f...
Jochen Dörre, Peter Gerstl, Roland Seiffert
AUSFORENSICS
2003
15 years 4 months ago
Honeyd - A OS Fingerprinting Artifice
This research looks at the efficiency of the honeyd honeypot system to reliably deceive intruders. Honeypots are being used as frontline network intelligence and forensic analysis...
Craig Valli
KI
2008
Springer
15 years 3 months ago
On Restaurants and Requirements: How Requirements Engineering may be Facilitated by Scripts
Requirements engineering is a central part of software projects. It is assumed that two third of all errors in software projects are caused by forgotten requirements or mutual misu...
Christoph Peylo
ATAL
2005
Springer
15 years 9 months ago
Theory of moves learners: towards non-myopic equilibria
In contrast to classical game theoretic analysis of simultaneous and sequential play in bimatrix games, Steven Brams has proposed an alternative framework called the Theory of Mov...
Arjita Ghosh, Sandip Sen
108
Voted
COLCOM
2008
IEEE
15 years 10 months ago
Incentive and Trust Issues in Assured Information Sharing
Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different secur...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...