Machine Learning and Its Use in E-Commerce and E-Business
暂无分享,去创建一个
[1] Li Zhao,et al. Statistical Machine Learning in Natural Language Understanding: Object Constraint Language Translator for Business Process , 2008, 2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop.
[2] Azzedine Boukerche,et al. A trust-based security system for ubiquitous and pervasive computing environments , 2008, Comput. Commun..
[3] Mousa Al-Akhras,et al. Logic-Based Security Architecture for Systems Providing Multihop Communication , 2013, Int. J. Distributed Sens. Networks.
[4] Weihong Han,et al. Online anomaly detection on e-commerce based on variable-length behavior sequence , 2015 .
[5] Amir Herzberg,et al. TCP Ack storm DoS attacks , 2011, Comput. Secur..
[6] Saumya Chaturvedi,et al. Sentiment analysis using machine learning for business intelligence , 2017, 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI).
[7] Harri Oinas-Kukkonen,et al. Introduction to E-Commerce, Engagement, and Social Influence Minitrack , 2015, 2015 48th Hawaii International Conference on System Sciences.
[8] Earley Seth,et al. Mobile Commerce: A Broader Perspective , 2014, IT Professional.
[9] Nagul Cooharojananone,et al. The study of mobile learning readiness in rural area: Case of North-Eastern of Thailand , 2017, 2017 International Symposium on Computers in Education (SIIE).
[10] Yi Wan,et al. Fitting and Prediction for Crack Propagation Rate Based on Machine Learning Optimal Algorithm , 2009, 2009 International Conference on E-Learning, E-Business, Enterprise Information Systems, and E-Government.
[11] Sajal K. Das,et al. Security enforcement in wireless sensor networks: A framework based on non-cooperative games , 2006, Pervasive Mob. Comput..
[12] Rafael Timóteo de Sousa Júnior,et al. Trust-based security for the OLSR routing protocol , 2013, Comput. Commun..
[13] Ning Gu,et al. Workflow process mining based on machine learning , 2003, Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).
[14] Ming Zhang. Artificial Higher Order Neural Networks for Computer Science and Engineering: Trends for Emerging Applications , 2010 .
[15] Halim Berradi,et al. Multipoint relay selection through estimated spatial relation in smart city environments , 2018, 2018 International Conference on Advanced Communication Technologies and Networking (CommNet).
[16] Venky Shankararaman,et al. Enterprise Systems Enabling Smart Commerce , 2014, 2014 IEEE 16th Conference on Business Informatics.
[17] Shuning Wu,et al. A user-centric machine learning framework for cyber security operations center , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).
[18] Pedro Malagón,et al. Improving security in WMNs with reputation systems and self-organizing maps , 2011, J. Netw. Comput. Appl..
[19] Li Cuizhi,et al. A study on key technologies in the development of mobile e-commerce , 2011, 2011 International Conference on E-Business and E-Government (ICEE).
[20] Hsiao-Hwa Chen,et al. Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[21] Abhay Bansal,et al. Assessment of QoS based multicast routing protocols in MANET , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).