Sciweavers

618 search results - page 113 / 124
» Applying Distributed Object Technology to Network Planning
Sort
View
KDD
2006
ACM
145views Data Mining» more  KDD 2006»
14 years 8 months ago
Deriving quantitative models for correlation clusters
Correlation clustering aims at grouping the data set into correlation clusters such that the objects in the same cluster exhibit a certain density and are all associated to a comm...
Arthur Zimek, Christian Böhm, Elke Achtert, H...
SECURWARE
2008
IEEE
14 years 1 months ago
Rating Agencies Interoperation for Peer-to-Peer Online Transactions
— In current peer-to-peer systems users interact with unknown services and users for the purpose of online transactions such as file sharing and trading of commodities. Peer-to-...
Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Lui...
SEMWEB
2007
Springer
14 years 1 months ago
Privacy and Capability Management for the European eIDM Framework
The natural evolution of eGovernment is to go beyond the management of identities and therefore it is necessary to manage people, companies or organizations, and their capabilities...
Mario Reyes-Ayala, Ignacio Alamillo, Daniel Chavar...
ADCOG
2004
13 years 9 months ago
Social and Ethical Considerations in Virtual Worlds
While networking technology facilitates the use of online services such as real-time instant messaging and anywhere-anytime multiplayer gaming, societal and ethical issues can inf...
Robert W. Kerbs
DAIS
2001
13 years 9 months ago
Sentient Computing for Everyone
: Sentient Computing gives perception to computing systems so that they can detect, interpret and respond to changing aspects of users' context. The location attribute of a us...
Diego López de Ipiña, Sai Lai Lo