Sciweavers

181 search results - page 31 / 37
» Fuzzy Sets in Financial Analysis
Sort
View
HICSS
2007
IEEE
162views Biometrics» more  HICSS 2007»
14 years 1 months ago
Value-at-Risk in IT Services Contracts
As information systems (IS) and technology solutions become increasingly service-driven, managers are faced with the task of choosing parameters such as service-levels, pricing, a...
Robert J. Kauffman, Ryan Sougstad
KDD
1994
ACM
113views Data Mining» more  KDD 1994»
13 years 11 months ago
Exploration of Simulation Experiments by Discovery
: Weexemplify in this paper, howa discovery system is applied to the analysis of simulation experimentsin practical political planning, andshowwhatkind of newknowledgecan be discov...
Willi Klösgen
RAID
2010
Springer
13 years 5 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
IVS
2010
44views more  IVS 2010»
13 years 2 months ago
Generalized scatter plots
Scatter Plots are one of the most powerful and most widely used techniques for visual data exploration. A well-known problem is that scatter plots often have a high degree of overl...
Daniel A. Keim, Ming C. Hao, Umeshwar Dayal, Halld...
GCC
2005
Springer
14 years 1 months ago
The Computation of Semantic Data Cube
The multidimensional analysis based on data cube has been growing interest. However existing data cube model usually does not have the semantics of attributes and hence the analysi...
Yubao Liu, Jian Yin