Sciweavers

1016 search results - page 134 / 204
» Explore or Exploit
Sort
View
DOLAP
2006
ACM
14 years 3 months ago
Enhanced mining of association rules from data cubes
On-line analytical processing (OLAP) provides tools to explore and navigate into data cubes in order to extract interesting information. Nevertheless, OLAP is not capable of expla...
Riadh Ben Messaoud, Sabine Loudcher Rabaséd...
IUI
2006
ACM
14 years 3 months ago
Head gesture recognition in intelligent interfaces: the role of context in improving recognition
Acknowledging an interruption with a nod of the head is a natural and intuitive communication gesture which can be performed without significantly disturbing a primary interface ...
Louis-Philippe Morency, Trevor Darrell
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
14 years 2 months ago
Survey of Strategic Alignment Impacts on Organizational Performance in International European Companies
act The strategic use of technology based information systems (IS/IT) is a fundamental issue for every business. This is particularly true in the case of firms that engage in inter...
Hajer Kefi, Michel Kalika
ICDE
2005
IEEE
124views Database» more  ICDE 2005»
14 years 2 months ago
SemCrypt - Ensuring Privacy of Electronic Documents Through Semantic-Based Encrypted Query Processing
The trend towards outsourcing increases the number of documents stored at external service providers. This storage model, however, raises privacy and security concerns because the...
Michael Schrefl, Katharina Grün, Jürgen ...
INFOCOM
2005
IEEE
14 years 2 months ago
The effect of DNS delays on worm propagation in an IPv6 Internet
— It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can ex...
Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos ...