Narrow your search
Listing 1 - 10 of 13 << page
of 2
>>
Sort by

Periodical
Logistiek totaal : het grootste vakblad voor de interne logistiek.
ISSN: 1872986X Year: 2007 Publisher: Doetinchem Basta

Loading...
Export citation

Choose an application

Bookmark

Abstract

Integral warehouse management : The Next Generation in Transparency, Collaboration and Warehouse Management Systems.
Author:
ISBN: 9781419668760 Year: 2007 Publisher: Utrecht Management Outlook Publications

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Product Recommendations in e-Commerce Retailing Applications.
Author:
ISBN: 3631754523 3631566220 Year: 2007 Publisher: Frankfurt am Main : Peter Lang GmbH, Internationaler Verlag der Wissenschaften,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book deals with product recommendations generated by information systems referred to as recommender systems. Recommender systems assist consumers in making product choices by providing recommendations of the range of products and services offered in an online purchase environment. The quantitative research study investigates the influence of psychographic and sociodemographic determinants on the interest of consumers in personalized online book recommendations. The author presents new findings regarding the interest in recommendations, importance of product reviews for the decision process, motives for submitting ratings as well as comments, and the delivery of recommendations. The results show that opinion seeking, opinion leading, domain specific innovativeness, online shopping experience, and age are important factors in respect of the interest in personalized recommendations.


Book
Dueck's panopticon : gesammelte kultkolumnen
Author:
ISBN: 3540717056 Year: 2007 Publisher: Berlin ; Heidelberg : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In der IT-Welt, unter den "Techies" und Ingenieuren, genießen die Kolumnen des IBM-Vordenkers Gunter Dueck weithin einen fast legendären Ruf. Leidenschaftlich subjektiv wird jeweils Aktuelles und besonders Zukünftiges aufs Korn genommen und scharf-humorig auf den Punkt gebracht. Der vorliegende Band vereint 42 assoziative Feuerwerke des Kultautors und bietet ein kunterbuntes Potpourri: Artgerechte Haltung von Menschen unter besonderer Berücksichtigung von "Techies", Unfreiheit der Forschung, Plattwürmer & Mensch, Softwarepatente, Aufrufe an Manager, endlich die Versuche einzustellen, Naturgesetze zu umgehen. Gegen zwanghafte Evaluation, kindhafte Begeisterung über viel zu Neues, gegen jährlich wechselnde Managementfehler und Beraterhypes ("Triebrichtungen") usw. usw. Dueck: "Ich muss und will Ihnen nicht immer aus der Seele sprechen – aber was spricht gegen einen gelegentlichen Neuronensturm?".


Book
International Conference on Networking, Architecture, and Storage : July 29-31, 2007, Guilin, China : proceedings
Authors: --- ---
ISBN: 0769529275 1509089209 Year: 2007 Publisher: [Place of publication not identified] IEEE Computer Society


Book
Data Warehousing and Knowledge Discovery
Authors: --- --- ---
ISBN: 9783540745532 Year: 2007 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Data Warehousing and Knowledge Discovery have been widely accepted as key te- nologies for enterprises and organizations to improve their abilities in data analysis, decision support, and the automatic extraction of knowledge from data. With the exponentially growing amount of information to be included in the decision-making process, the data to be processed become more and more complex in both structure and semantics. Consequently, the process of retrieval and knowledge discovery from this huge amount of heterogeneous complex data constitutes the reality check for research in the area. During the past few years, the International Conference on Data Warehousing and Knowledge Discovery (DaWaK) has become one of the most important international scientific events bringing together researchers, developers and practitioners. The DaWaK conferences served as a prominent forum for discussing latest research issues and experiences in developing and deploying data warehousing and knowledge d- covery systems, applications, and solutions. This year's conference, the Ninth Inter- tional Conference on Data Warehousing and Knowledge Discovery (DaWaK 2007), built on this tradition of facilitating the cross-disciplinary exchange of ideas, expe- ence and potential research directions. DaWaK 2007 sought to disseminate innovative principles, methods, algorithms and solutions to challenging problems faced in the development of data warehousing, knowledge discovery and data mining applications.


Book
Data Warehousing and Data Mining Techniques for Cyber Security
Authors: ---
ISBN: 9780387476537 Year: 2007 Publisher: Boston, MA Springer Science+Business Media, LLC

Loading...
Export citation

Choose an application

Bookmark

Abstract

Data warehousing and data mining provide techniques for collecting information from distributed databases and for performing data analysis. The ever expanding, tremendous amount of data collected and stored in large databases has far exceeded our human ability to comprehend--without the proper tools. There is a critical need for data analysis that can automatically analyze data, summarize it and predict future trends. In the modern age of Internet connectivity, concerns about denial of service attacks, computer viruses and worms are extremely important. Data Warehousing and Data Mining Techniques for Cyber Security contributes to the discipline of security informatics. The author discusses topics that intersect cyber security and data mining, while providing techniques for improving cyber security. Since the cost of information processing and internet accessibility is dropping, an increasing number of organizations are becoming vulnerable to cyber attacks. This volume introduces techniques for applications in the area of retail, finance, and bioinformatics, to name a few. Data Warehousing and Data Mining Techniques for Cyber Security is designed for practitioners and researchers in industry. This book is also suitable for upper-undergraduate and graduate-level students in computer science.


Digital
Data Warehousing and Data Mining Techniques for Cyber Security
Author:
ISBN: 9780387476537 Year: 2007 Publisher: Boston, MA Springer Science+Business Media, LLC


Digital
Data Warehousing and Knowledge Discovery : 9th International Conference, DaWaK 2007, Regensburg Germany, September 3-7, 2007. Proceedings
Authors: --- ---
ISBN: 9783540745532 Year: 2007 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg

Data warehousing and data mining techniques for cyber security
Author:
ISBN: 128081652X 9786610816521 0387476539 0387264094 1441938915 Year: 2007 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Data warehousing and data mining provide techniques for collecting information from distributed databases and for performing data analysis. The ever expanding, tremendous amount of data collected and stored in large databases has far exceeded our human ability to comprehend--without the proper tools. There is a critical need for data analysis that can automatically analyze data, summarize it and predict future trends. In the modern age of Internet connectivity, concerns about denial of service attacks, computer viruses and worms are extremely important. Data Warehousing and Data Mining Techniques for Cyber Security contributes to the discipline of security informatics. The author discusses topics that intersect cyber security and data mining, while providing techniques for improving cyber security. Since the cost of information processing and internet accessibility is dropping, an increasing number of organizations are becoming vulnerable to cyber attacks. This volume introduces techniques for applications in the area of retail, finance, and bioinformatics, to name a few. Data Warehousing and Data Mining Techniques for Cyber Security is designed for practitioners and researchers in industry. This book is also suitable for upper-undergraduate and graduate-level students in computer science.

Keywords

Computer security. --- Data warehousing. --- Data mining. --- Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Database management. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Database Management. --- Data Mining and Knowledge Discovery. --- Data Structures, Cryptology and Information Theory. --- Data Encryption. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Information warehousing --- Warehousing, Data --- Database management --- Management information systems --- Multidimensional databases --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Cryptology. --- Data structures (Computer science)

Listing 1 - 10 of 13 << page
of 2
>>
Sort by