Sciweavers

1716 search results - page 223 / 344
» Reflections on a Geometry of Processes
Sort
View
CSREASAM
2006
15 years 5 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
ECIS
2004
15 years 5 months ago
Evaluation of phenomenological findings in IS research: a study in developing web-based IS
This paper presents a phenomenological investigation of project managers' experiences with the implementation of web-based employee service systems (ESS), a domain that has w...
Pradipta K. Sarkar, Jacob L. Cybulski
ECIS
2001
15 years 5 months ago
Using Intranet technology to foster organizational knowledge creation
Many organizations have embraced intranets with the intent to harness the technology to support knowledge management initiatives. Despite the promise that intranet technology hold...
Jan Damsgaard, Rens Scheepers
EUSFLAT
2001
127views Fuzzy Logic» more  EUSFLAT 2001»
15 years 5 months ago
Soft computing in investment appraisal
Standard financial techniques neglect extreme situations and regards large market shifts as too unlikely to matter. Such approach accounts for what occurs most of the time in the ...
Antoaneta Serguieva, John Hunter, Tatiana Kalganov...
LWA
2004
15 years 5 months ago
Dirichlet Enhanced Latent Semantic Analysis
This paper describes nonparametric Bayesian treatments for analyzing records containing occurrences of items. The introduced model retains the strength of previous approaches that...
Kai Yu, Shipeng Yu, Volker Tresp