This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
The digital divide between developed and non-developed countries or large and smaller companies in terms of adoption of new technologies and particularly the Internet and electron...
— Some electric power markets allow bidders to specify constraints on ramp rates for increasing or decreasing power production. We show in a small example that a bidder could use...
The concept of customer relationship management (CRM) resonates with managers in today's competitive economy. Yet recent articles in the business press have described CRM imp...
Moving around our physical environment, we are surrounded and interact with information that exhorts and stimulates us to buy things. For most of us, not all of these impulses are...
Developments in e-government are resulting in fundamental reorganizations of the ways in which democratic governments operate as well as in the ways in which citizens relate to th...
Human-robot interaction is a growing research domain; there are many approaches to robot design, depending on the particular aspects of interaction being focused on. In this paper...
Long transactions cause pragmatic problems for workflow systems – as the transaction is moving, so is the surrounding world. We look at three scenarios in which external events ...
Enterprise resource planning (ERP) maintenance and upgrade activities are receiving much attention in ERP-using organizations. Annual maintenance costs approximate 25% of initial ...
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...