Sciweavers

5689 search results - page 1034 / 1138
» A Performance Process Maturity Model
Sort
View
ENTCS
2006
173views more  ENTCS 2006»
15 years 4 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
INTERFACES
2008
77views more  INTERFACES 2008»
15 years 4 months ago
Showcase Scheduling at Fred Astaire East Side Dance Studio
: The ballroom dancing showcases at Fred Astaire East Side Dance Studio in Manhattan are held at least twice a year and provide the students with an environment for socializing, pr...
Miguel A. Lejeune, Nevena Yakova
JCST
2008
138views more  JCST 2008»
15 years 4 months ago
Predicting Chinese Abbreviations from Definitions: An Empirical Learning Approach Using Support Vector Regression
In Chinese, phrases and named entities play a central role in information retrieval. Abbreviations, however, make keyword-based approaches less effective. This paper presents an em...
Xu Sun, Houfeng Wang, Bo Wang 0003
IS
2006
15 years 4 months ago
A methodology for clustering XML documents by structure
The processing and management of XML data are popular research issues. However, operations based on the structure of XML data have not received strong attention. These operations ...
Theodore Dalamagas, Tao Cheng, Klaas-Jan Winkel, T...
JIKM
2008
168views more  JIKM 2008»
15 years 4 months ago
A Framework for Developing and Aligning a Knowledge Management Strategy
Businesses today, including non-profits, recognise the need for knowledge management (KM). KM may require new strategies and goals before it can be implemented, or it can be aligne...
Deborah E. Swain, Jean-Pierre Booto Ekionea
« Prev « First page 1034 / 1138 Last » Next »