Sciweavers

79 search results - page 7 / 16
» Identifying Inhabitants of an Intelligent Environment Using ...
Sort
View
CIDM
2009
IEEE
14 years 2 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
ESANN
2004
13 years 8 months ago
Data Mining Techniques on the Evaluation of Wireless Churn
This work focuses on one of the most critical issues to plague the wireless telecommunications industry today: the loss of a valuable subscriber to a competitor, also defined as ch...
Jorge Ferreira, Marley B. R. Vellasco, Marco Aur&e...
FLAIRS
2007
13 years 9 months ago
Using Plans to Automate Software Applications
Many software applications consist of a number of interdependent steps and are executed under the supervision of a human administrator or operator. The administrator responds to e...
Jon R. Wright
AAAI
2008
13 years 9 months ago
Learning to Improve Earth Observation Flight Planning
This paper describes a method and system for integrating machine learning with planning and data visualization for the management of mobile sensors for Earth science investigation...
Robert A. Morris, Nikunj C. Oza, Leslie Keely, Eli...
IFIP
2001
Springer
13 years 11 months ago
Semiotics and Intelligent Control
The overall purpose of this paper is to demonstrate the relevance of semiotics concepts to the analysis of intelligent control systems. Semiotics has only a minor impact on resear...
Morten Lind