D.Sailaja, K.Nasaramma, M.Sumender Roy, Venkateswarlu Bondu
|
|
- Agnes Welch
- 7 years ago
- Views:
Transcription
1 Predictive Modeling of Customers in Personalization Alications with Context D.Sailaja, K.Nasaramma, M.Sumender Roy, Venkateswarlu Bondu Nasaramma.K is currently ursuing her M.Tech in Godavari Institute of Engineering and Technology. Rajahmundry, India Sailaja.D is currently ursuing her M.Tech in Avanti Grou of Colleges, Visakhaatnam, India. Sumender Roy is currently working as Professor in Godavari Institute of Engineering and Technology. Rajahmundry, India. Venkateswarlu Bondu ursuing Ph.D in Comuter Science in Andhra University. Abstract--- The idea that context is imortant when redicting customer behavior has been maintained by scholars in marketing and data mining. However, no systematic study measuring how much the contextual information really matters in building customer models in ersonalization alications has been done before. In this roject, we show how imortant the contextual information is when redicting customer behavior and how to use it when building customer models. It is done by conducting an emirical study across a wide range of exerimental conditions. The exerimental results show that context does matter when modeling the behavior of individual customers. These findings have significant imlications for data miners and marketers. They show that contextual information does matter in ersonalization and comanies have different oortunities to make context valuable for imroving redictive erformance of customers behavior. Index Terms Personalization, Context, Data Mining, User Modeling, Predictive Modeling.. INTRODUCTION:. Introduction to Project: Contextual information indeed makes a significant difference in building better customer models in marketing and e-commerce alications. In this roject, we address the question of whether this additional contextual information matters, i.e., does it lead to building better ersonalized models of customer behavior, where by better we assume suerior redictive erformance. This roblem is not trivial because it entails a tradeoff between transaction homogeneity and data sarsity: by roviding contextual information, customer transactions ertaining to this articular context are reduced, making fewer data oints to fit the model, while homogeneity of these transactions increases, making it easier to redict more accurately customer behavior in similar contexts. In data mining terms, this roblem is related to the well-known biasvariance tradeoff, i.e., given contextual information, which effect dominates the other: decreased bias due to the homogeneity of transactions associated with the secified context or increased variance due to insufficient data associated with this context. Therefore the research question that we just described can be summarized as follows: Does context matter for building better models to redicting customer behavior? In this aer, we answer the question emirically by conducting an emirical study on data set across a wide range of exerimental conditions. To answer the question, we built two alternative customer models, one including contextual information and the other one not, and comared their redictive erformances. This study makes the following contributions to studying context in ersonalization alications. First, we demonstrate that context indeed matters when redicting customer behavior for whole or small homogenous grous of customers and gets diluted during the rocess of aggregating customers data. Finally, the context is taking externally, and then used for redicting customer s behavior. We show that the resulting model significantly outerforms the basic uncontextual model..2 Introduction to modules:.2. Collecting dataset externally..2.2 Clustering the data..2.3 Aly redictive modeling on datasets and clusters. 34 P a g e
2 .2. Collecting dataset externally: The exeriment has been conducted on e-retailer dataset which is created by us. For each customer, the following demograhic data were added: age, revious studies, marital status, comosition of the family, lace of living, hobbies, and whether the customer owned a car. The transactional data include: item urchased, rice, day, time, session duration, number of clicks er connection, and the time elased for the web age..2.2 Clustering the data: Aly K-mean clustering algorithm on dataset and divide into clusters: cluster, cluster2 and cluster Aly redictive modeling on dataset and clusters: Aly Naive-Bayes classification algorithm to redict customer behavior on whole dataset and each clusters are cluster, cluster2 and cluster3. 2. PROBLEM FORMULATION: In our roject, first exlain what we mean by context, then how we model customer behavior, and finally, the methodology for comaring contextual and uncontextual models. 2. What Is Context? Many definitions of context can be found in the literature deending on the field of alication, enabling technologies, and the available customer data. The Webster s dictionary defines context as conditions or circumstances which affect something. In the data mining community, context is defined as those events that characterize the life of a customer and can determine a change in his/her references, status, and value for a comany. Examles of context include a new job, the birth of a son, marriage, divorce, and retirement. In the contextaware systems literature, context was initially defined as the location of the user, the identity of eole near the user, the objects around, and the changes in these elements. Other factors have been added to the revious definition. For instance, includes the date, the season, and the temerature. Add the hysical and concetual statuses of interest for a user and include the user s emotional status and broaden the definition to any information that can characterize and is relevant to the interaction between a user and an alication. Some associate the context with the user, while others emhasize how context relates to the alication? Context has temoral (when to deliver), satial (where), and technological (how) dimensions. Context is usually referred to the resent situation, but sometimes the history of ast is considered as well. In this aer, context is defined as the intent of a urchase made by a customer in an e-commerce alication. Different urchasing intents may lead to different tyes of behavior. For examle, the same customer may buy from the same online account different roducts for different reasons: a book for imroving her ersonal work skills, a book as a gift, or an electronic device for her hobby. In general, the context in which a customer erforms a transaction is defined with a set of contextual attributes K that can have a comlicated structure reflecting the comlex nature of this information. Each contextual attribute K in K is defined by a set of q attributes: K = (K;...;Kq) contextual attribute K secifying the intent of a urchasing transaction in an e-retailer alication, considered. K is ersonal context: ersonal urchase made for the work-related or other uroses. Similarly, the Gift value for K can be slit into a gift for a artner or a friend and a gift for arents or others. Thus, K= {PersonalWork; PersonalOther; GiftPartner/Friend; Gift Parent/ Other}. Finally, attribute K to be taken. 2.2 Customer Modeling: Let C be the customer base reresented by N customers. Each customer C i is defined by the set of m demograhic attributes A ={ A ;A 2 ;...;A m }, and a set of r transactions Trans(C i )={ TR i ; TR i2 ;... ; TR ir }, where each transaction TR ij erformed by customer C i is defined by a set of transactional attributes T ={T ; T 2 ;... ; T }. In addition, we also have contextual information K associated with each transaction TR ir, in Fig. reresents a fragment of the customer table containing demograhic, transactional, and contextual information about the customer C i. For examle, customer C i can be defined by demograhic attributes A= {IDuser; Name; Age; Income}, by five transactions Trans(C i )={TR ; TR 2 ; TR 3 ; TR 4 ; TR 5 }, each transaction defined by the transactional attributes: T ={ ProductID; StoreID; Price; TransactionTime}. In general, however, we suort multile contextual attributes. Finally, the customer base C can be artitioned into several segments by comuting summary statistic S for customer C i over the transactions Trans(C i )={TR i ; TR i2 ;... ; TR ik } made by that customer using statistical aggregation and moment function, such as mean. For instance, for the transactions made by the customers in the revious examle, the statistic can be S = {Average rice}. This means, among other things, that each customer C i has a unique summary statistic S and that a customer is reresented with a unique oint in the sace of these summary statistics. After generating such a data oint er customer in the 35 P a g e
3 sace of statistics S, customers can be clustered into grous (segments) in that sace using the K-Means clustering technique. Given segment α, of k customers C ;... ; C k, and their resective demograhic A i ={ A i ; A i2 ;...;A im } and transactional data Trans(C i )={ TR i ; TR i2 ;... ; TR ik } for customers i in α, we want to build a single redictive model M α on this segment of customers α : Y =f(x ;X 2 ;...;X );..(); where deendent variable Y is one of the transactional attributes T j, and indeendent variables X ;X 2 ;..;X are all the transactional and demograhic variables, excet variable T j, i.e., they form the set T A T j. The erformance of model M α can be measured using some fitness function f maing the data of this grou of customers α into real, i.e., f( α ) Є R. For examle, model M α can be a decision tree built on data α of customers C ;... ; C k, for the urose of redicting T j variable time of urchase using all the transactional and demograhic variables, excet variable T j as indeendent variables. The fitness function f of model M α can be its redictive accuracy on the outof-samle data. The redictive models do not assume any contextual information since the contextual variable K is not a art of the model. Therefore, we call the model of this tye uncontextual. We define contextual counterarts of redictive model (), where the model takes the following form: Demograhic Attributes A Transactional Attributes T Y =f Kq=a (X ;X 2 ;...;X ); (2) Context K A A m T T K K q TR j A j A jm T j. TR j2 A j A jm T j2. TR jr A j A jm T jr. T j. T j2. T jr.... transactions associated with a articular value of the context attribute K q =α are used for building the model. In this case, the contextual information is used as a label for filtering customer transactions and then droed variable, such as the demograhic and transactional attributes X ;X 2 ;..;X. This means that it is used as one of the attributes for redicting Y.One interesting question when building contextual models is where to lace urchasing transactions of customer C when she bought a gift for customer C 2 : should such a transaction be associated with the urchasing history of customer C or C 2? In this aer, we associate such urchases with customer C and not C 2 for the following reasons: First, these urchases reflect ercetions of customer C about what customer C 2 needs, not the real traits and needs of customer C 2. Second, even though the user may want to interret exectations and references of another individual, it would be very unusual to model behavior of a erson by observing the behavior of another individual. Third, when building a model for customer C, the demograhical and transactional data used in this behavioral model are those related to customer C. One way to handle this roblem of gifts is to define an aroriate context of gifts and urchases for others and treat such urchasing behavior in these contexts. This rovides for extra flexibility because we can treat such urchasing transactions differently in different contexts. For answering the research question (Does context matter?), a comarison between erformance results of redictive models is erformed for the uncontextual () and the contextual (2) models across a wide range of exerimental conditions can be secified by relacing the deendent variable Y in () with the context variable K as K q =f (X ;X 2 ;...;X ); (3). In model (3), the deendent variable is the contextual information. One contextual attribute is inferred at a time. For model (3), f is a redictive function learned via naïve bayes model. 2.3 Figures: Demograhic, transactional, and contextual information about the customers and their transactions.: Fig. Where the model 2 constitute the way of creating a contextual model. Model 2 indicates that only Grahical reresentation of the redictive model: 36 P a g e
4 Fig Results: 3. Does Context Matter? To give a flavor of the results, given the exeriment settings (contextual information, data set, one classifier, two deendent variables)., the below figures resents three grahs generated by lotting the values of the e-retailer data set for contextual information and uncontextual. The grahs are resented in the order of rogressively more refined contextual information. Moreover, most of the contextual models show a better redictive erformance comared to the uncontextual, excet for some cases where the difference is very small. Although for these charts the curves are not always monotonic, the redictive erformance of the contextual models is usually higher than that of the uncontextual model. Analyzing and comaring the erformance curves, the first evident result shows the uncontextual model is always below the other two contextual models. It means that, indeendently from the level of analysis, and from the exerimental settings, gathering contextual information gives better results in terms of customers behavior redictions. Another interesting oint is the monotonic shae of each erformance curve. The results shows better results in context comared to uncontextual in three different stores (store00, store0, and store02). In three stores shows context is better comared to uncontext in two tyes of charts (curve, bar). 37 P a g e
5 Is it necessary to acquire contextual information or is it ossible to infer it from the data? How do we exloit the inferred contextual information for modeling customer behavior? The exeriments will be conducted redicting different transactional variable Y, using more classifier algorithms f, considering more levels of market granularity through finer segments, and generating more contextual models using the further sublevels of the ersonal and gift shoing mode variables. 5. BIBOLOGRAPHY:. Using Context to Imrove Predictive Modeling of Customers in Personalization Alications. Cosimo Palmisano, Alexander Tuzhilin, Michele Gorgoglione. IEEE Transaction on Knowledge and Data Engineering. 4. CONCLUSION & FUTURE WORK: 4. Conclusion: This work has been conducted a comarative study of contextual and un-contextual models across multile dimension of analysis such as the context variable, classifier algorithm and different tyes of metrics. This analysis has been erformed with the aim of demonstrating the relevance of the context in building customer rofiles. Our results show that, in different exerimental settings, the contextual model, in general, outerforms the un-contextual one; this overcome is more relevant. This underlines the fact that the context matters in building customers urchasing rofiles and it should be of great effectiveness if alied for building ersonalized recommendation in the e-commerce environment. 2. Data Mining Concets and Techniques.- Han & Kamber. 3. Increasing Customer Value by Integrating DataMining and Camaign Management Software, Direct Marketing Magazine, Feb, Data Mining: Introductory and Advanced Toics Margaret Dunham. Prentice Hall, Mining the e-commerce data to analyze the target customer behavior. Yuantao Jiang, Siqin Yu. 6. Java Comlete Reference. Herbert Schildt. 7. Unified Modeling Language. Grady Booch. 8. htt:// Further research will be held making more comlex the exerimental settings in order to give more emirical evidence of the results. And will rove two more questions for better redicting 38 P a g e
Evaluating a Web-Based Information System for Managing Master of Science Summer Projects
Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk
More informationSynopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE
RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently
More informationRisk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7
Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk
More informationOn the predictive content of the PPI on CPI inflation: the case of Mexico
On the redictive content of the PPI on inflation: the case of Mexico José Sidaoui, Carlos Caistrán, Daniel Chiquiar and Manuel Ramos-Francia 1 1. Introduction It would be natural to exect that shocks to
More informationFailure Behavior Analysis for Reliable Distributed Embedded Systems
Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of
More informationElectronic Commerce Research and Applications
Electronic Commerce Research and Alications 12 (2013) 246 259 Contents lists available at SciVerse ScienceDirect Electronic Commerce Research and Alications journal homeage: www.elsevier.com/locate/ecra
More informationTHE director of personalization of one of the major
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 20, NO. 11, NOVEMBER 2008 1535 Using Context to Improve Predictive Modeling of Customers in Personalization Applications Cosimo Palmisano, Member,
More informationThe Online Freeze-tag Problem
The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,
More informationThe impact of metadata implementation on webpage visibility in search engine results (Part II) q
Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra
More informationBuffer Capacity Allocation: A method to QoS support on MPLS networks**
Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean
More informationAnalysis of Effectiveness of Web based E- Learning Through Information Technology
International Journal of Soft Comuting and Engineering (IJSCE) Analysis of Effectiveness of Web based E- Learning Through Information Technology Anand Tamrakar, Kamal K. Mehta Abstract-Advancements of
More informationTime-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes
Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal
More informationIndex Numbers OPTIONAL - II Mathematics for Commerce, Economics and Business INDEX NUMBERS
Index Numbers OPTIONAL - II 38 INDEX NUMBERS Of the imortant statistical devices and techniques, Index Numbers have today become one of the most widely used for judging the ulse of economy, although in
More informationAn Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems
The International ournal of Soft Comuting and Software Engineering [SCSE], Vol., No., Secial Issue: The Proceeding of International Conference on Soft Comuting and Software Engineering 0 [SCSE ], San Francisco
More informationJena Research Papers in Business and Economics
Jena Research Paers in Business and Economics A newsvendor model with service and loss constraints Werner Jammernegg und Peter Kischka 21/2008 Jenaer Schriften zur Wirtschaftswissenschaft Working and Discussion
More informationDAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON
DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad
More informationComparing Dissimilarity Measures for Symbolic Data Analysis
Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,
More informationMonitoring Frequency of Change By Li Qin
Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial
More informationENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science
More informationAn important observation in supply chain management, known as the bullwhip effect,
Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National
More informationForensic Science International
Forensic Science International 214 (2012) 33 43 Contents lists available at ScienceDirect Forensic Science International jou r nal h o me age: w ww.els evier.co m/lo c ate/fo r sc iin t A robust detection
More informationThe predictability of security returns with simple technical trading rules
Journal of Emirical Finance 5 1998 347 359 The redictability of security returns with simle technical trading rules Ramazan Gençay Deartment of Economics, UniÕersity of Windsor, 401 Sunset, Windsor, Ont.,
More informationPartial-Order Planning Algorithms todomainfeatures. Information Sciences Institute University ofwaterloo
Relating the Performance of Partial-Order Planning Algorithms todomainfeatures Craig A. Knoblock Qiang Yang Information Sciences Institute University ofwaterloo University of Southern California Comuter
More informationRejuvenating the Supply Chain by Benchmarking using Fuzzy Cross-Boundary Performance Evaluation Approach
ICSI International Journal of Engineering and echnology, Vol.2, o.6, December 2 ISS: 793-8236 Rejuvenating the Suly Chain by Benchmarking using uzzy Cross-Boundary erformance Evaluation roach RU SUIL BIDU,
More informationDesign of A Knowledge Based Trouble Call System with Colored Petri Net Models
2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung
More informationA Modified Measure of Covert Network Performance
A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy
More informationAn inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods
An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,
More informationC-Bus Voltage Calculation
D E S I G N E R N O T E S C-Bus Voltage Calculation Designer note number: 3-12-1256 Designer: Darren Snodgrass Contact Person: Darren Snodgrass Aroved: Date: Synosis: The guidelines used by installers
More informationOn-the-Job Search, Work Effort and Hyperbolic Discounting
On-the-Job Search, Work Effort and Hyerbolic Discounting Thomas van Huizen March 2010 - Preliminary draft - ABSTRACT This aer assesses theoretically and examines emirically the effects of time references
More informationfor UK industrial and scientific companies managed by Business Marketing Online
for UK industrial and scientific comanies managed by Business Marketing Online This is a Google AdWords advertisement and so is this... and so is this......advertising with Google Adwords is now essential.
More informationManaging specific risk in property portfolios
Managing secific risk in roerty ortfolios Andrew Baum, PhD University of Reading, UK Peter Struemell OPC, London, UK Contact author: Andrew Baum Deartment of Real Estate and Planning University of Reading
More informationMachine Learning with Operational Costs
Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and
More informationStorage Basics Architecting the Storage Supplemental Handout
Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it
More informationWeb Application Scalability: A Model-Based Approach
Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research
More informationCRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS
Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The
More informationAlpha Channel Estimation in High Resolution Images and Image Sequences
In IEEE Comuter Society Conference on Comuter Vision and Pattern Recognition (CVPR 2001), Volume I, ages 1063 68, auai Hawaii, 11th 13th Dec 2001 Alha Channel Estimation in High Resolution Images and Image
More informationCABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION
XI Conference "Medical Informatics & Technologies" - 2006 Rafał Henryk KARTASZYŃSKI *, Paweł MIKOŁAJCZAK ** MRI brain segmentation, CT tissue segmentation, Cellular Automaton, image rocessing, medical
More informationc 2009 Je rey A. Miron 3. Examples: Linear Demand Curves and Monopoly
Lecture 0: Monooly. c 009 Je rey A. Miron Outline. Introduction. Maximizing Pro ts. Examles: Linear Demand Curves and Monooly. The Ine ciency of Monooly. The Deadweight Loss of Monooly. Price Discrimination.
More informationThe Advantage of Timely Intervention
Journal of Exerimental Psychology: Learning, Memory, and Cognition 2004, Vol. 30, No. 4, 856 876 Coyright 2004 by the American Psychological Association 0278-7393/04/$12.00 DOI: 10.1037/0278-7393.30.4.856
More informationStatic and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks
Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,
More informationTOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES
TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France
More information17609: Continuous Data Protection Transforms the Game
17609: Continuous Data Protection Transforms the Game Wednesday, August 12, 2015: 8:30 AM-9:30 AM Southern Hemishere 5 (Walt Disney World Dolhin) Tony Negro - EMC Rebecca Levesque 21 st Century Software
More informationProject Management and. Scheduling CHAPTER CONTENTS
6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method
More informationThe risk of using the Q heterogeneity estimator for software engineering experiments
Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for
More informationA Multivariate Statistical Analysis of Stock Trends. Abstract
A Multivariate Statistical Analysis of Stock Trends Aril Kerby Alma College Alma, MI James Lawrence Miami University Oxford, OH Abstract Is there a method to redict the stock market? What factors determine
More informationPoint Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)
Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint
More informationTwo-resource stochastic capacity planning employing a Bayesian methodology
Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning
More informationCompensating Fund Managers for Risk-Adjusted Performance
Comensating Fund Managers for Risk-Adjusted Performance Thomas S. Coleman Æquilibrium Investments, Ltd. Laurence B. Siegel The Ford Foundation Journal of Alternative Investments Winter 1999 In contrast
More informationRummage Web Server Tuning Evaluation through Benchmark
IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.
More informationFinding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network
Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs
More informationConcurrent Program Synthesis Based on Supervisory Control
010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract
More informationMemory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs
Memory management Chater : Memory Management Part : Mechanisms for Managing Memory asic management Swaing Virtual Page relacement algorithms Modeling age relacement algorithms Design issues for aging systems
More informationMeasures of Clinic Systems in Clinic Surveys
use is not associated with better diabetes care Patrick J. O Connor, MD, MPH, A. Lauren Crain, PhD, Leif I. Solberg, MD, Stehen E. Asche, MA, William A. Rush, PhD, Robin R. Whitebird, PhD, MSW Electronic
More informationBeyond the F Test: Effect Size Confidence Intervals and Tests of Close Fit in the Analysis of Variance and Contrast Analysis
Psychological Methods 004, Vol. 9, No., 164 18 Coyright 004 by the American Psychological Association 108-989X/04/$1.00 DOI: 10.1037/108-989X.9..164 Beyond the F Test: Effect Size Confidence Intervals
More informationVERIFICATION AND VALIDATION OF CFD SIMULATIONS
ERFATON AND ALDATON OF FD SLATONS by Fred Stern, Robert. Wilson, Hugh W. oleman*, and Eric. Paterson of owa nstitute of Hydraulic Research and * Proulsion Research enter echanical and Aerosace Engineering
More informationA Brief Overview of Intermodal Transportation
A Brief Overview of Intermodal Transortation Tolga Bektas Teodor Gabriel Crainic January 2007 CIRRELT-2007-03 Tolga Bektas 1, Teodor Gabriel Crainic 1,* 1 Interuniversity Research Centre on Enterrise Networks,
More informationSoftmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting
Journal of Data Science 12(2014),563-574 Softmax Model as Generalization uon Logistic Discrimination Suffers from Overfitting F. Mohammadi Basatini 1 and Rahim Chiniardaz 2 1 Deartment of Statistics, Shoushtar
More informationDrinking water systems are vulnerable to
34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental
More informationhttp://www.ualberta.ca/~mlipsett/engm541/engm541.htm
ENGM 670 & MECE 758 Modeling and Simulation of Engineering Systems (Advanced Toics) Winter 011 Lecture 9: Extra Material M.G. Lisett University of Alberta htt://www.ualberta.ca/~mlisett/engm541/engm541.htm
More informationIMPROVING NAIVE BAYESIAN SPAM FILTERING
Master Thesis IMPROVING NAIVE BAYESIAN SPAM FILTERING Jon Kågström Mid Sweden University Deartment for Information Technology and Media Sring 005 Abstract Sam or unsolicited e-mail has become a major roblem
More informationRisk in Revenue Management and Dynamic Pricing
OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri
More informationImproved Algorithms for Data Visualization in Forensic DNA Analysis
Imroved Algorithms for Data Visualization in Forensic DNA Analysis Noor Maizura Mohamad Noor, Senior Member IACSIT, Mohd Iqbal akim arun, and Ahmad Faiz Ghazali Abstract DNA rofiles from forensic evidence
More informationHigh Quality Offset Printing An Evolutionary Approach
High Quality Offset Printing An Evolutionary Aroach Ralf Joost Institute of Alied Microelectronics and omuter Engineering University of Rostock Rostock, 18051, Germany +49 381 498 7272 ralf.joost@uni-rostock.de
More informationAutomatic Search for Correlated Alarms
Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany
More informationApplications of Regret Theory to Asset Pricing
Alications of Regret Theory to Asset Pricing Anna Dodonova * Henry B. Tiie College of Business, University of Iowa Iowa City, Iowa 52242-1000 Tel.: +1-319-337-9958 E-mail address: anna-dodonova@uiowa.edu
More informationGAS TURBINE PERFORMANCE WHAT MAKES THE MAP?
GAS TURBINE PERFORMANCE WHAT MAKES THE MAP? by Rainer Kurz Manager of Systems Analysis and Field Testing and Klaus Brun Senior Sales Engineer Solar Turbines Incororated San Diego, California Rainer Kurz
More informationEfficient Training of Kalman Algorithm for MIMO Channel Tracking
Efficient Training of Kalman Algorithm for MIMO Channel Tracking Emna Eitel and Joachim Seidel Institute of Telecommunications, University of Stuttgart Stuttgart, Germany Abstract In this aer, a Kalman
More informationLarge-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation
Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu
More informationSage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software
I Planning Guide The Comlete Buyer s Guide for Payroll Software Table of Contents Introduction... 1 Recent Payroll Trends... 2 Payroll Automation With Emloyee Self-Service... 2 Analyzing Your Current Payroll
More informationLearning Human Behavior from Analyzing Activities in Virtual Environments
Learning Human Behavior from Analyzing Activities in Virtual Environments C. BAUCKHAGE 1, B. GORMAN 2, C. THURAU 3 & M. HUMPHRYS 2 1) Deutsche Telekom Laboratories, Berlin, Germany 2) Dublin City University,
More informationAsymmetric Information, Transaction Cost, and. Externalities in Competitive Insurance Markets *
Asymmetric Information, Transaction Cost, and Externalities in Cometitive Insurance Markets * Jerry W. iu Deartment of Finance, University of Notre Dame, Notre Dame, IN 46556-5646 wliu@nd.edu Mark J. Browne
More informationINFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1
RESEARCH NOTE INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 Rajiv Garg McCombs School of Business, The University of Texas at Austin, Austin, TX 78712 U.S.A. {Rajiv.Garg@mccombs.utexas.edu} Rahul
More informationService Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with
More informationFrom Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling
From to Exeriment: A Case Study on Multirocessor Task Scheduling Sascha Hunold CNRS / LIG Laboratory Grenoble, France sascha.hunold@imag.fr Henri Casanova Det. of Information and Comuter Sciences University
More informationService Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with
More informationWeb Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State
Pay tream A D V I S O R S WHITE PAPER Web Inv Web Invoicing Strategic Imact of AP Automation What s Inside Inefficiencies in Current State Key Drivers for Automation Web Invoicing Comonents New Automation
More informationIEEM 101: Inventory control
IEEM 101: Inventory control Outline of this series of lectures: 1. Definition of inventory. Examles of where inventory can imrove things in a system 3. Deterministic Inventory Models 3.1. Continuous review:
More informationComputational Finance The Martingale Measure and Pricing of Derivatives
1 The Martingale Measure 1 Comutational Finance The Martingale Measure and Pricing of Derivatives 1 The Martingale Measure The Martingale measure or the Risk Neutral robabilities are a fundamental concet
More informationFundamental Concepts for Workflow Automation in Practice
Fundamental Concets for Workflow Automation in Practice Stef Joosten and Sjaak Brinkkemer Centre for Telematics and Information Technology, University of Twente, The Netherlands March 12, 1995 This aer
More informationEffect Sizes Based on Means
CHAPTER 4 Effect Sizes Based on Means Introduction Raw (unstardized) mean difference D Stardized mean difference, d g Resonse ratios INTRODUCTION When the studies reort means stard deviations, the referred
More informationInt. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290
2386 Survey: Biological Insired Comuting in the Network Security V Venkata Ramana Associate Professor, Deartment of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360 Email: ramanacsecbit@gmail.com Y.Subba
More informationLarge firms and heterogeneity: the structure of trade and industry under oligopoly
Large firms and heterogeneity: the structure of trade and industry under oligooly Eddy Bekkers University of Linz Joseh Francois University of Linz & CEPR (London) ABSTRACT: We develo a model of trade
More informationMoving Objects Tracking in Video by Graph Cuts and Parameter Motion Model
International Journal of Comuter Alications (0975 8887) Moving Objects Tracking in Video by Grah Cuts and Parameter Motion Model Khalid Housni, Driss Mammass IRF SIC laboratory, Faculty of sciences Agadir
More informationCorporate Compliance Policy
Cororate Comliance Policy English Edition FOREWORD Dear Emloyees, The global nature of Bayer s oerations means that our activities are subject to a wide variety of statutory regulations and standards
More informationMultiperiod Portfolio Optimization with General Transaction Costs
Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei
More informationExpert Systems with Applications
Exert Systems with Alications 38 (2011) 11984 11997 Contents lists available at ScienceDirect Exert Systems with Alications journal homeage: www.elsevier.com/locate/eswa Review On the alication of genetic
More informationtype The annotations of the 62 samples with respect to the cancer types FL, CLL, DLBCL-A, DLBCL-G.
alizadeh Samle a from a lymhoma/leukemia gene exression study Samle a for the ISIS method Format x A 2000 x 62 gene exression a matrix of log-ratio values. 2,000 genes with the highest variance across
More informationFranck Cappello and Daniel Etiemble LRI, Université Paris-Sud, 91405, Orsay, France Email: fci@lri.fr
MPI versus MPI+OenMP on the IBM SP for the NAS Benchmarks Franck Caello and Daniel Etiemble LRI, Université Paris-Sud, 945, Orsay, France Email: fci@lri.fr Abstract The hybrid memory model of clusters
More informationSQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID
International Journal of Comuter Science & Information Technology (IJCSIT) Vol 6, No 4, August 014 SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID
More informationNormally Distributed Data. A mean with a normal value Test of Hypothesis Sign Test Paired observations within a single patient group
ANALYSIS OF CONTINUOUS VARIABLES / 31 CHAPTER SIX ANALYSIS OF CONTINUOUS VARIABLES: COMPARING MEANS In the last chater, we addressed the analysis of discrete variables. Much of the statistical analysis
More informationLearner and Instructional Factors Influencing Learning Outcomes within a Blended Learning Environment
Lim, D. H., & Morris, M. L. (2009). Learner and Instructional Factors Influencing Outcomes within a Blended Environment. Educational Technology & Society, 12 (4), 282 293. Learner and Instructional Factors
More information401K Plan. Effective January 1, 2014
401K Plan Effective January 1, 2014 Summary Plan Descrition Particiation...2 Contributions...2 Disabled Particiants...4 Definition of Comensation...4 Legal Limits on Contributions...4 Enrollment...5 Investment
More informationCharacterizing and Modeling Network Traffic Variability
Characterizing and Modeling etwork Traffic Variability Sarat Pothuri, David W. Petr, Sohel Khan Information and Telecommunication Technology Center Electrical Engineering and Comuter Science Deartment,
More informationSage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist
I Planning Guide The HR Software Buyer s Guide and Checklist Table of Contents Introduction... 1 Recent Trends in HR Technology... 1 Return on Emloyee Investment Paerless HR Workflows Business Intelligence
More information1 Gambler s Ruin Problem
Coyright c 2009 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins
More informationSage Timberline Office
Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User
More informationX How to Schedule a Cascade in an Arbitrary Graph
X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network
More informationStochastic Derivation of an Integral Equation for Probability Generating Functions
Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating
More informationOptional Strain-Rate Forms for the Johnson Cook Constitutive Model and the Role of the Parameter Epsilon_0 1 AUTHOR
Otional Strain-Rate Forms for the Johnson Cook Constitutive Model and the Role of the Parameter Esilon_ AUTHOR Len Schwer Schwer Engineering & Consulting Services CORRESPONDENCE Len Schwer Schwer Engineering
More informationWhere you are Where you need to be How you get there Market Intelligence Competitive Insights Winning Strategies
Where you are Where you need to be How you get there Market Intelligence Cometitive Insights Winning Strategies The industrial and B2B market research and strategy firm Dominate Your Markets Whether you
More information