NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Zhang, Yi – ProQuest LLC, 2011
Due to the rapid advances in computing and sensing technologies, enormous amounts of data are being generated everyday in various applications. The integration of data mining and data visualization has been widely used to analyze these massive and complex data sets to discover hidden patterns. For both data mining and visualization to be…
Descriptors: Information Technology, Data Processing, Data Analysis, Information Retrieval
Ji, Shengyue – ProQuest LLC, 2011
Traditional information systems return answers after a user submits a complete query. Users often feel "left in the dark" when they have limited knowledge about the underlying data, and have to use a try-and-see approach for finding information. The trend of supporting autocomplete in these systems is a first step towards solving this problem. A…
Descriptors: Information Systems, Online Searching, Search Strategies, Computer Interfaces
Cruz, Marivic – ProQuest LLC, 2010
In 2007 and 2008, government challenges consisted of error prone, manually intensive, and inefficient environments for financial reporting. Banking regulators worldwide faced issues with respect to transparency, timeliness, quality, and managing risks associated with accounting opacity. The general problem was the existing reporting standards and…
Descriptors: Accounting, Banking, Financial Audits, Reports
Cai, Chaoli – ProQuest LLC, 2009
Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…
Descriptors: Energy Conservation, Testing, Computer Security, Statistical Inference