Sciweavers

303 search results - page 26 / 61
» Mine your business
Sort
View
HICSS
2010
IEEE
258views Biometrics» more  HICSS 2010»
13 years 7 months ago
An Empirical Comparison of Four Text Mining Methods
The amount of textual data that is available for researchers and businesses to analyze is increasing at a dramatic rate. This reality has led IS researchers to investigate various...
Sangno Lee, Jeff Baker, Jaeki Song, James C. Wethe...
ICDIM
2007
IEEE
14 years 1 months ago
Proposed secure mechanism for identification of ownership of undressed photographs or movies captured using camera based mobile
: Cameras attached to mobile phones are becoming more and more common, and as we move towards 3G and Next Generation Networks, it has become more a standard feature of mobile phone...
Samir B. Patel
SAINT
2002
IEEE
14 years 17 days ago
Ubiquitous Commerce - Always On, Always Aware, Always Pro-active
The development of the infrastructure for ubiquitous computing is progressing rapidly, yet the applications that will be built on this new infrastructure remain largely ill define...
Anatole Gershman
SIGECOM
2000
ACM
132views ECommerce» more  SIGECOM 2000»
14 years 19 hour ago
What is actually taking place on web sites: e-commerce lessons from web server logs
A prime business concern is knowing your customer. One legacy carried into the present from the earliest NCSA web servers is web server logs. While there are more powerful user tr...
Mark Rosenstein
BPM
2006
Springer
109views Business» more  BPM 2006»
13 years 11 months ago
A Generic Import Framework for Process Event Logs
Abstract. The application of process mining techniques to real-life corporate environments has been of an ad-hoc nature so far, focused on proving the concept. One major reason for...
Christian W. Günther, Wil M. P. van der Aalst