Sciweavers

762 search results - page 104 / 153
» Modeling and Simulating Information Security Management
Sort
View
CONTEXT
2007
Springer
14 years 1 months ago
Between Symbol and Language-in-use
Indexing is often designed with the intent of dimensional reduction, that is, of generating standardised and uniform descriptive metadata. This could be characterised as a process ...
Emma Tonkin
WSC
2008
13 years 10 months ago
Application of fuzzy-MRP-II in fast moving consumer goods manufacturing industry
In today's global marketplace, the information associated with a product is fast becoming a critical link in the supply chain. Especially in fast moving consumer goods (FMCGs...
Jiping Niu, John Dartnall
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
14 years 2 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
TNN
2010
174views Management» more  TNN 2010»
13 years 2 months ago
Equivalences between neural-autoregressive time series models and fuzzy systems
Soft computing (SC) emerged as an integrating framework for a number of techniques that could complement one another quite well (artificial neural networks, fuzzy systems, evolutio...
José Luis Aznarte, José Manuel Ben&i...
DAWAK
2008
Springer
13 years 9 months ago
Adapting LDA Model to Discover Author-Topic Relations for Email Analysis
Analyzing the author and topic relations in email corpus is an important issue in both social network analysis and text mining. The AuthorTopic model is a statistical model that id...
Liqiang Geng, Hao Wang, Xin Wang, Larry Korba