Sciweavers

5970 search results - page 891 / 1194
» Management Information Model Engineering
Sort
View
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
15 years 10 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu
WSC
1998
15 years 6 months ago
Using Simulation in Call Centers
A company's call center is its most visible strategic weapon. It is a business battlefront where millions of dollars of products and services are purchased, sold, and traded....
Vivek Bapat, Eddie B. Pruitte Jr.
JCP
2008
116views more  JCP 2008»
15 years 5 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
ENGL
2007
100views more  ENGL 2007»
15 years 5 months ago
Utilizing Computational Intelligence to Assist in Software Release Decision
—Defect tracking using computational intelligence methods is used to predict software readiness in this study. By comparing predicted number of faults and number of faults discov...
Tong-Seng Quah, Mie Mie Thet Thwin
219
Voted
SIGMOD
2007
ACM
160views Database» more  SIGMOD 2007»
16 years 5 months ago
Supporting ranking and clustering as generalized order-by and group-by
The Boolean semantics of SQL queries cannot adequately capture the "fuzzy" preferences and "soft" criteria required in non-traditional data retrieval applicati...
Chengkai Li, Min Wang, Lipyeow Lim, Haixun Wang, K...