Sciweavers

3686 search results - page 643 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
JDCTA
2010
347views more  JDCTA 2010»
13 years 2 months ago
Application of 3D body scanning technology to human measurement for clothing Fit
Complications with garment sizing and poor fit inconvenience many consumers who become dissatisfied with such provision on the high street. It is evident that human measurement an...
Phoebe R. Apeagyei
TSE
2008
131views more  TSE 2008»
13 years 7 months ago
Enhancing an Application Server to Support Available Components
Three-tier middleware architecture is commonly used for hosting enterprise-distributed applications. Typically, the application is decomposed into three layers: front end, middle t...
Achmad I. Kistijantoro, Graham Morgan, Santosh K. ...
TC
2010
13 years 6 months ago
The Design and Evaluation of a Self-Organizing Superpeer Network
—Superpeer architectures exploit the heterogeneity of nodes in a peer-to-peer (P2P) network by assigning additional responsibilities to higher capacity nodes. In the design of a ...
Pawel Garbacki, Dick H. J. Epema, Maarten van Stee...
HT
2011
ACM
12 years 11 months ago
Personalisation in the wild: providing personalisation across semantic, social and open-web resources
One of the key motivating factors for information providers to use personalisation is to maximise the benefit to the user in accessing their content. However, traditionally such s...
Ben Steichen, Alexander O'Connor, Vincent Wade
SAC
2006
ACM
13 years 7 months ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...