Sciweavers

217 search results - page 7 / 44
» A Knowledge Base for Justified Information Security Decision...
Sort
View
RSEISP
2007
Springer
14 years 1 months ago
Web-Based Support Systems with Rough Set Analysis
Abstract. Rough sets have been applied to many areas where multiattribute data is needed to be analyzed to acquire knowledge for decision making. Web-based Support Systems (WSS) ar...
Jingtao Yao, Joseph P. Herbert
FLAIRS
2007
13 years 10 months ago
The Evolution and Evaluation of an Internet Search Tool for Information Analysts
We are working on a project aimed at building next generation analyst support tools that focus analysts’ attention on the most critical and novel information found within the da...
Elizabeth T. Whitaker, Robert L. Simpson Jr.
INCDM
2010
Springer
208views Data Mining» more  INCDM 2010»
13 years 9 months ago
Combining Unsupervised and Supervised Data Mining Techniques for Conducting Customer Portfolio Analysis
Abstract. Leveraging the power of increasing amounts of data to analyze customer base for attracting and retaining the most valuable customers is a major problem facing companies i...
Zhiyuan Yao, Annika H. Holmbom, Tomas Eklund, Barb...
AOSD
2010
ACM
14 years 29 days ago
A permission system for secure AOP
The integration of third-party aspects into applications creates security challenges. Due to the intrusive impact of aspects, one cannot guarantee that the dynamic composition of ...
Wouter De Borger, Bart De Win, Bert Lagaisse, Wout...
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 6 months ago
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
—In this paper, we investigate methods for reducing the likelihood that a message transmitted between two multiantenna nodes is intercepted by an undetected eavesdropper. In part...
Amitav Mukherjee, A. Lee Swindlehurst