Sciweavers

24105 search results - page 4577 / 4821
» Models in Information Retrieval
Sort
View
DISCEX
2003
IEEE
15 years 9 months ago
Detecting Novel Scans Through Pattern Anomaly Detection
We introduce a technique for detecting anomalous patterns in a categorical feature (one that takes values from a finite alphabet). It differs from most anomaly detection methods u...
Alfonso Valdes
114
Voted
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
15 years 9 months ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
HICSS
2003
IEEE
136views Biometrics» more  HICSS 2003»
15 years 9 months ago
Value Positions for Financial Institutions in Electronic Bill Presentment and Payment (EBPP)
Business to consumer (B2C) electronic commerce has led to new relationships connecting various supply chain partners via the Internet, significantly increasing the quantity and qu...
Alea M. Fairchild
130
Voted
SCAM
2003
IEEE
15 years 9 months ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
155
Voted
WECWIS
2003
IEEE
132views ECommerce» more  WECWIS 2003»
15 years 9 months ago
Page Digest for Large-Scale Web Services
The rapid growth of the World Wide Web and the Internet has fueled interest in Web services and the Semantic Web, which are quickly becoming important parts of modern electronic c...
Daniel Rocco, David Buttler, Ling Liu
« Prev « First page 4577 / 4821 Last » Next »