Sciweavers

487 search results - page 44 / 98
» Personal Information Management (PIM) for Intelligence Analy...
Sort
View
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
15 years 6 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
KDD
2009
ACM
211views Data Mining» more  KDD 2009»
16 years 11 days ago
Address standardization with latent semantic association
Address standardization is a very challenging task in data cleansing. To provide better customer relationship management and business intelligence for customer-oriented cooperates...
Honglei Guo, Huijia Zhu, Zhili Guo, Xiaoxun Zhang,...
SIGMOD
2008
ACM
139views Database» more  SIGMOD 2008»
15 years 12 months ago
Paths to stardom: calibrating the potential of a peer-based data management system
As peer-to-peer (P2P) networks become more familiar to the database community, intense interest has built up in using their scalability and resilience properties to scale database...
Mihai Lupu, Beng Chin Ooi, Y. C. Tay
ENTER
2008
Springer
15 years 1 months ago
Evaluating Recommender Systems in Tourism - A Case Study from Austria
Recommender systems (RS) are employed to personalize user interaction with (e.g. tourism) web-sites, supporting both navigation through large service assortments and the configura...
Markus Zanker, Matthias Fuchs, Wolfram Höpken...
WSC
2004
15 years 1 months ago
The Hats Simulator
The Hats Simulator is designed to be a lightweight proxy for many intelligence analysis problems, and thus a test environment for analysts' tools. It is a virtual world in wh...
Paul R. Cohen, Clayton T. Morrison