Sciweavers

12101 search results - page 194 / 2421
» Mutual Information Analysis
Sort
View
131
Voted
IPM
2006
106views more  IPM 2006»
15 years 3 months ago
The information seeking behaviour of the users of digital scholarly journals
The article employs deep log analysis (DLA) techniques, a more sophisticated form of transaction log analysis, to demonstrate what usage data can disclose about information seekin...
David Nicholas, Paul Huntington, Hamid R. Jamali M...
181
Voted
SOCIALCOM
2010
15 years 1 months ago
A Decision Theoretic Approach to Data Leakage Prevention
Abstract--In both the commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information. In this paper we address the threat of infor...
Janusz Marecki, Mudhakar Srivatsa, Pradeep Varakan...
ICIP
2004
IEEE
16 years 5 months ago
On information hiding with incomplete information about steganalysis
Suppose the information hider has a set of information hiding schemes to be employed in the presence of a set of steganalysis detectors. Let the information hider have only an inc...
Rajarathnam Chandramouli
132
Voted
KBSE
2007
IEEE
15 years 10 months ago
Using information retrieval to support design of incremental change of software
The proposed research defines an approach to combine Information Retrieval based analysis of the textual information embedded in software artifacts with program static and dynamic...
Denys Poshyvanyk, Andrian Marcus
ECIS
2000
15 years 5 months ago
Melding Information Systems Evaluation with the Information Systems Development Life-Cycle
- In this paper we consider the synergy between two areas of IS literature: that concerned with the evaluation of information systems and that concerned with explaining the phenome...
Paul Beynon-Davies, Ian Owens, Michael Lloyd-Willi...