Sciweavers

4466 search results - page 774 / 894
» Large-Scale Data Analysis Using Heuristic Methods
Sort
View
200
Voted
SADFE
2008
IEEE
15 years 9 months ago
Computer Forensics in Forensis
Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about ...
Sean Peisert, Matt Bishop, Keith Marzullo
ICDM
2007
IEEE
124views Data Mining» more  ICDM 2007»
15 years 9 months ago
Local Probabilistic Models for Link Prediction
One of the core tasks in social network analysis is to predict the formation of links (i.e. various types of relationships) over time. Previous research has generally represented ...
Chao Wang, Venu Satuluri, Srinivasan Parthasarathy
GFKL
2007
Springer
196views Data Mining» more  GFKL 2007»
15 years 9 months ago
Comparison of Recommender System Algorithms Focusing on the New-item and User-bias Problem
Recommender systems are used by an increasing number of e-commerce websites to help the customers to find suitable products from a large database. One of the most popular techniqu...
Stefan Hauger, Karen H. L. Tso, Lars Schmidt-Thiem...
119
Voted
CHES
2004
Springer
121views Cryptology» more  CHES 2004»
15 years 8 months ago
Improving the Security of Dual-Rail Circuits
Dual-rail encoding, return-to-spacer protocol and hazard-free logic can be used to resist differential power analysis attacks by making the power consumption independent of process...
Danil Sokolov, Julian Murphy, Alexandre V. Bystrov...
164
Voted
HICSS
2003
IEEE
201views Biometrics» more  HICSS 2003»
15 years 8 months ago
Critical Success Factors of Enterprise Resource Planning Systems Implementation Success in China
ERP implementation issues have been given much attention since two decades ago due to its low implementation success. Nearly 90 percent of ERP implementations are late or over bud...
Liang Zhang, Matthew K. O. Lee, Zhe Zhang, Probir ...