Sciweavers

17983 search results - page 3512 / 3597
» Set Types and Applications
Sort
View
105
Voted
ECIS
2004
15 years 4 months ago
Discourse analysis: making complex methodology simple
Discursive-based analysis of organizations is not new in the field of interpretive social studies. Since not long ago have information systems (IS) studies also shown a keen inter...
Tatyana V. Bondarouk, Huub J. M. Ruël
207
Voted
EVOTING
2004
100views Hardware» more  EVOTING 2004»
15 years 4 months ago
E-Democracy in E-Austria
Abstract: Christian Rupp has been appointed Federal Executive Secretary of EGovernment in May of 2003. At that point of time a new E-Government Platform was introduced. He reports ...
Christian Rupp
133
Voted
DMIN
2006
111views Data Mining» more  DMIN 2006»
15 years 4 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel
165
Voted
FLAIRS
2004
15 years 4 months ago
Inducing Fuzzy Decision Trees in Non-Deterministic Domains using CHAID
Most decision tree induction methods used for extracting knowledge in classification problems are unable to deal with uncertainties embedded within the data, associated with human...
Jay Fowdar, Zuhair Bandar, Keeley A. Crockett
134
Voted
FLAIRS
2004
15 years 4 months ago
A Method Based on RBF-DDA Neural Networks for Improving Novelty Detection in Time Series
Novelty detection in time series is an important problem with application in different domains such as machine failure detection, fraud detection and auditing. An approach to this...
Adriano L. I. Oliveira, Fernando Buarque de Lima N...
« Prev « First page 3512 / 3597 Last » Next »