Sciweavers

3193 search results - page 536 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
HICSS
2002
IEEE
89views Biometrics» more  HICSS 2002»
14 years 3 months ago
ICT-Impact on Services
The state of service management practice and the developments in ICT-efficiency research prompt the call for managerial relevance, normative theory building and the conceptualizat...
Alexander G. Bielowski, Rita Walczuch
ADVIS
2000
Springer
14 years 2 months ago
Throughput Stability of Reliable Multicast Protocols
Traditional reliable multicast protocols depend on assumptions about flow control and reliability mechanisms, and they suffer from a kind of interference between these mechanisms. ...
Öznur Özkasap, Kenneth P. Birman
CIKM
2006
Springer
14 years 2 months ago
Resource-aware kernel density estimators over streaming data
A fundamental building block of many data mining and analysis approaches is density estimation as it provides a comprehensive statistical model of a data distribution. For that re...
Christoph Heinz, Bernhard Seeger
GECCO
2008
Springer
229views Optimization» more  GECCO 2008»
13 years 11 months ago
EIN-WUM: an AIS-based algorithm for web usage mining
With the ever expanding Web and the information published on it, effective tools for managing such data and presenting information to users based on their needs are becoming nece...
Adel Torkaman Rahmani, B. Hoda Helmi
HICSS
2006
IEEE
122views Biometrics» more  HICSS 2006»
14 years 4 months ago
Cooperation in Group-Buying Auctions
Cooperation among bidders in traditional auctions is generally forbidden because it is harmful to the interests of sellers. However, in a new type of online auction, the group-buy...
Jian Chen, Xilong Chen, Robert J. Kauffman, Xiping...