Sciweavers

249 search results - page 29 / 50
» Online Aggregation
Sort
View
ICPR
2008
IEEE
14 years 2 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
HICSS
2007
IEEE
105views Biometrics» more  HICSS 2007»
14 years 2 months ago
Implementation of Internet Technology for Local Government Website: Design Guidelines
There may be limited resources for local government website designers to devote to innovative design. This study investigated current technology use by local government (Town of B...
Hyung Nam Kim, Andrea L. Kavanaugh, Tonya L. Smith...
CHI
2010
ACM
14 years 1 months ago
Trained to accept?: a field experiment on consent dialogs
A typical consent dialog was shown in 2×2×3 experimental variations to 80,000 users of an online privacy tool. We find that polite requests and button texts pointing to a volun...
Rainer Böhme, Stefan Köpsell
SSDBM
1999
IEEE
108views Database» more  SSDBM 1999»
14 years 23 days ago
Supporting Imprecision in Multidimensional Databases Using Granularities
On-Line Analytical Processing (OLAP) technologies are being used widely, but the lack of effective means of handling data imprecision, which occurs when exact values are not known...
Torben Bach Pedersen, Christian S. Jensen, Curtis ...
KDD
1998
ACM
113views Data Mining» more  KDD 1998»
14 years 22 days ago
Targeting Business Users with Decision Table Classifiers
Business users and analysts commonly use spreadsheets and 2D plots to analyze and understand their data. On-line Analytical Processing (OLAP) provides these users with added flexi...
Ron Kohavi, Dan Sommerfield