Usage data

Results: 884



#Item
121Information science / Information retrieval / Internet search engines / Semantic Web / Computing / Internet search / Data management / Web search query / Query languages / Freebase / Semantic query / Database

Web Usage Mining with Semantic Analysis Laura Hollink ∗ Peter Mika

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:06
122

left250002514600Kortschak Center for Learning and Creativity Data Usage Report 900007300Kortschak Center for Learning and Creativity Data Usage Report righttop2013 Spring 2011-Fall

Add to Reading List

Source URL: kortschakcenter.usc.edu

Language: English - Date: 2014-10-24 20:10:14
    123

    Controlling Data Usage with UserManaged Access (UMA) Eve Maler W3C Privacy and Data Usage Control Workshop OctoberOverview

    Add to Reading List

    Source URL: www.w3.org

    Language: English - Date: 2010-09-28 13:53:16
      124Data mining / Anomaly detection / Data security / Networks / Machine learning / Community structure / Supervised learning / Anomaly / Graph drawing / Local outlier factor / Shortest path problem / Outlier

      Detecting Insider Threats in a Real Corporate Database of Computer Usage Activity Ted E. Senator, Henry G. David A.Bader, Edmond Chow, Thomas G. Dietterich, Alan Goldberg, Alex Memory, Irfan Essa, Joshua Jones,

      Add to Reading List

      Source URL: www.cc.gatech.edu

      Language: English - Date: 2013-06-03 22:19:16
      125

      COURSE SCHEDULE Psychology 395 Hussong, Fall 2014 ALL LAB MEETINGS ARE ON FRIDAYS FROM 10:00am-11:00amIntroduction & Orientation, Setting Hours and Lab Manual, Lab Confidentiality and Data Usage Agreement;

      Add to Reading List

      Source URL: hussong.web.unc.edu

      Language: English - Date: 2014-10-22 11:21:56
        126Broadband / Computing / Technology / Data transmission / Net neutrality / Digital media / OpenFlow / Internet access / Bandwidth cap / Provisioning / Cloud computing / Internet

        Communicating with Caps: Managing Usage Caps in Home Networks Hyojoon Kim Srikanth Sundaresan

        Add to Reading List

        Source URL: conferences.sigcomm.org

        Language: English - Date: 2011-08-01 22:53:54
        127

        DATA SECURITY QUESTIONNAIRE Usage This Data Security Questionnaire (Questionnaire) is intended to be completed by University of Washington (University) departments that are considering a relationship with a third party (

        Add to Reading List

        Source URL: ciso.washington.edu

        Language: English - Date: 2012-07-20 19:22:47
          128

          TownofShermanCT.org - Privacy Policy Protecting your private information is our priority. This Statement of Privacy applies to the townofshermanct.org and Town of Sherman, CT and governs data collection and usage. For th

          Add to Reading List

          Source URL: www.townofshermanct.org

          Language: English - Date: 2014-04-23 15:23:31
            129

            Data Usage Agreement Submitting Organization: _________________________________________________ The NYS Office of Information Technology Services (NYS ITS) is engaged in two separate but related projects; building a stat

            Add to Reading List

            Source URL: gis.ny.gov

            Language: English - Date: 2014-10-28 12:11:45
              130

              Privacy Policy Protecting your private information is our priority. This Statement of Privacy applies to the www.wannagofast.com and Wannagofast, LLC and governs data collection and usage. For the purposes of this Privac

              Add to Reading List

              Source URL: www.wannagofast.com

              Language: English - Date: 2013-01-25 14:04:46
                UPDATE