Sciweavers

3363 search results - page 470 / 673
» Neurobiology of decision making
Sort
View
DASC
2006
IEEE
15 years 7 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
HICSS
2006
IEEE
135views Biometrics» more  HICSS 2006»
15 years 7 months ago
Optimizing an IT Project Portfolio with Time-Wise Interdependencies
Little research has examined the relevance of real options for valuation of information technology (IT) investments for prioritizing a portfolio of projects. When the effect of pr...
Indranil R. Bardhan, Robert J. Kauffman, Sanjeewa ...
HICSS
2006
IEEE
138views Biometrics» more  HICSS 2006»
15 years 7 months ago
An Efficient Algorithm for Real-Time Frequent Pattern Mining for Real-Time Business Intelligence Analytics
Finding frequent patterns from databases has been the most time consuming process in data mining tasks, like association rule mining. Frequent pattern mining in real-time is of in...
Rajanish Dass, Ambuj Mahanti
HICSS
2006
IEEE
123views Biometrics» more  HICSS 2006»
15 years 7 months ago
An Economic Model for Comparing Search Services
Search services are now ubiquitously employed in searching for documents on the Internet and on enterprise intranets. This research develops an economic model for comparing search...
Stephen K. Kwan, Shailaja Venkatsubramanyan
IAT
2006
IEEE
15 years 7 months ago
Strategic Issues in Trading Agent Competition: TAC-Classic
With the advancement of Internet Technology, increasing number of electronic marketplaces and online auction houses provides real-time transaction services for buyers and sellers ...
Francisco Oliveira, Yain-Whar Si