Sciweavers

222 search results - page 39 / 45
» Mining the network value of customers
Sort
View
BMCBI
2011
14 years 4 months ago
Learning genetic epistasis using Bayesian network scoring criteria
Background: Gene-gene epistatic interactions likely play an important role in the genetic basis of many common diseases. Recently, machine-learning and data mining methods have be...
Xia Jiang, Richard E. Neapolitan, M. Michael Barma...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
15 years 10 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
CAISE
1994
Springer
15 years 1 months ago
Information Systems Modernization
Put yourself in the place of a corporate Chief Information Officer or government agency Information Resource manager... The new budget managers are looking for a quick kill. Your ...
Anthony I. Wasserman
IEPOL
2010
130views more  IEPOL 2010»
14 years 7 months ago
Piracy or promotion? The impact of broadband Internet penetration on DVD sales
ABSTRACT Digital computer networks represent a disruptive technology, with the potential to create or destroy economic value in established industries. These opportunities and chal...
Michael D. Smith, Rahul Telang
ICDE
2007
IEEE
126views Database» more  ICDE 2007»
15 years 11 months ago
QPIAD: Query Processing over Incomplete Autonomous Databases
Incompleteness due to missing attribute values (aka "null values") is very common in autonomous web databases, on which user accesses are usually supported through media...
Hemal Khatri, Jianchun Fan, Yi Chen, Subbarao Kamb...