Sciweavers

7383 search results - page 1465 / 1477
» Theories of information behavior
Sort
View
ECRA
2010
111views more  ECRA 2010»
14 years 9 months ago
RDRP: Reward-Driven Request Prioritization for e-Commerce web sites
Meeting client Quality-of-Service (QoS) expectations proves to be a difficult task for the providers of e-Commerce services, especially when web servers experience overload condit...
Alexander Totok, Vijay Karamcheti
BMCBI
2006
88views more  BMCBI 2006»
14 years 9 months ago
A two-sample Bayesian t-test for microarray data
Background: Determining whether a gene is differentially expressed in two different samples remains an important statistical problem. Prior work in this area has featured the use ...
Richard J. Fox, Matthew W. Dimmic
CN
2006
163views more  CN 2006»
14 years 9 months ago
A framework for mining evolving trends in Web data streams using dynamic learning and retrospective validation
The expanding and dynamic nature of the Web poses enormous challenges to most data mining techniques that try to extract patterns from Web data, such as Web usage and Web content....
Olfa Nasraoui, Carlos Rojas, Cesar Cardona
CORR
2006
Springer
90views Education» more  CORR 2006»
14 years 9 months ago
About the Lifespan of Peer to Peer Networks
In this paper we analyze the ability of peer to peer networks to deliver a complete file among the peers. Early on we motivate a broad generalization of network behavior organizing...
Rudi Cilibrasi, Zvi Lotker, Alfredo Navarra, St&ea...
DSS
2006
140views more  DSS 2006»
14 years 9 months ago
Access control and audit model for the multidimensional modeling of data warehouses
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Eduardo Fernández-Medina, Juan Trujillo, Ro...
« Prev « First page 1465 / 1477 Last » Next »