Sciweavers

1479 search results - page 122 / 296
» Management without (Detailed) Models
Sort
View
INCDM
2010
Springer
152views Data Mining» more  INCDM 2010»
14 years 2 months ago
The Impact of Experimental Setup on Prepaid Churn Modeling: Data, Population and Outcome Definition
Prepaid customers in mobile telecommunications are not bound by a contract and can therefore change operators (‘churn’) at their convenience and without notification. This make...
Dejan Radosavljevik, Peter van der Putten, Kim Kyl...
PRICAI
2000
Springer
14 years 1 months ago
Task Models, Intentions, and Agent Conversation Policies
It is possible to define conversation policies, such as communication or dialogue protocols, that are based strictly on what messages and, respectively, what performatives may foll...
Renee Elio, Afsaneh Haddadi, Ajit Singh
JDCTA
2010
143views more  JDCTA 2010»
13 years 5 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
KDD
2004
ACM
132views Data Mining» more  KDD 2004»
14 years 10 months ago
Privacy preserving regression modelling via distributed computation
Reluctance of data owners to share their possibly confidential or proprietary data with others who own related databases is a serious impediment to conducting a mutually beneficia...
Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerom...
IFIP
2003
Springer
14 years 3 months ago
A Service Discovery Model for Wireless and Mobile Terminals in IPv6
As the mobility and the number of affordable, powerful, and highly portable devices becoming networked increases, so will the amount of networked services offered, managed and disc...
Bilhanan Silverajan, Jaakko Kalliosalo, Jarmo Harj...