Sciweavers

1621 search results - page 35 / 325
» What is Business Intelligence
Sort
View
DRM
2006
Springer
13 years 11 months ago
Vicarious infringement creates a privacy ceiling
In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTunes, there is considerable potential for collecting personal ...
Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver
AIED
2007
Springer
14 years 2 months ago
What Level of Tutor Interaction is Best?
Razzaq and Heffernan (2006) showed that scaffolding compared to hints on demand in an intelligent tutoring system could lead to higher averages on a middle school mathematics post-...
Leena M. Razzaq, Neil T. Heffernan, Robert W. Lind...
ATAL
2005
Springer
14 years 1 months ago
What kind of argument are we going to have today?
This paper is concerned with argumentation-based dialogues between agents. Much work in this area has been based upon an influential taxonomy of dialogue types developed by Walto...
Eva Cogan, Simon Parsons, Peter McBurney
HCI
2011
12 years 11 months ago
Proposal of BCM Evaluation Method Based on Disaster Scenario Simulation
Almost 20% of big earthquakes in the world occur in Japan. It becomes impossible for private companies and governments to carry out their business if they suffer from severe damage...
Ryuhei Kaneko, Yoshio Nakatani
SIGECOM
2000
ACM
132views ECommerce» more  SIGECOM 2000»
14 years 9 days ago
What is actually taking place on web sites: e-commerce lessons from web server logs
A prime business concern is knowing your customer. One legacy carried into the present from the earliest NCSA web servers is web server logs. While there are more powerful user tr...
Mark Rosenstein