Sciweavers

5970 search results - page 1163 / 1194
» Management Information Model Engineering
Sort
View
KDD
2006
ACM
127views Data Mining» more  KDD 2006»
14 years 9 months ago
Recommendation method for extending subscription periods
Online stores providing subscription services need to extend user subscription periods as long as possible to increase their profits. Conventional recommendation methods recommend...
Tomoharu Iwata, Kazumi Saito, Takeshi Yamada
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 9 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
14 years 9 months ago
Advances in flash memory SSD technology for enterprise database applications
The past few decades have witnessed a chronic and widening imbalance among processor bandwidth, disk capacity, and access speed of disk. According to Amdhal's law, the perfor...
Sang-Won Lee, Bongki Moon, Chanik Park
SACMAT
2009
ACM
14 years 3 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
14 years 3 months ago
The Influence of Instant Messaging Usage Behavior on Organizational Communication Satisfaction
In recent years, instant messaging (IM) has become a popular medium of online communication. While IM is expanding into the enterprise beyond personal use, it brings the convenien...
Shih-Ming Pi, Yi-Chih Liu, Tsang-Yao Chen, Shih-Hu...
« Prev « First page 1163 / 1194 Last » Next »