Sciweavers

104 search results - page 8 / 21
» dss 2010
Sort
View
DSS
2006
76views more  DSS 2006»
13 years 7 months ago
Mining web navigations for intelligence
The Internet is one of the fastest growing areas of intelligence gathering. We present a statistical approach, called principal clusters analysis, for analyzing millions of user n...
Harris Wu, Michael D. Gordon, Kurt DeMaagd, Weiguo...
DSS
2006
75views more  DSS 2006»
13 years 7 months ago
Model alignment of anthrax attack simulations
This paper describes our experience aligning two simulation models of disease progression after biological attacks. The first model is the Incubation-Prodromal-Fulminant (IPF) mod...
Li-Chiou Chen, Kathleen M. Carley, Douglas B. Frid...
DSS
2006
91views more  DSS 2006»
13 years 7 months ago
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. Howev...
Mukul Gupta, Jackie Rees, Alok R. Chaturvedi, Jie ...
DSS
2006
91views more  DSS 2006»
13 years 7 months ago
Exploring auction databases through interactive visualization
We introduce AuctionExplorer, a suite of tools for exploring databases of online auctions. The suite combines tools for collecting, processing, and interactively exploring auction...
Galit Shmueli, Wolfgang Jank, Aleks Aris, Catherin...
DSS
2006
95views more  DSS 2006»
13 years 7 months ago
On the computability of agent-based workflows
Workflow research is commonly concerned with optimization, modeling, and dependency. In this research, we however address a more fundamental issue. By modeling humans and machines...
Wai Yin Mok, Prashant Palvia, David Paper