Sciweavers

2742 search results - page 422 / 549
» Business Service Scheduling
Sort
View
128
Voted
DIGITALCITIES
2000
Springer
15 years 8 months ago
The Information Society in the City of Antwerp
In Antwerp the dream of an information highway became reality a long time ago. Antwerp has its electronic highway and every day it grows new side-roads and exits. The main aim is t...
Bruno Peeters
134
Voted
AGENTS
1998
Springer
15 years 8 months ago
Personal Security Agent: KQML-Based PKI
Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...
Qi He, Katia P. Sycara, Timothy W. Finin
147
Voted
CIA
1998
Springer
15 years 8 months ago
Cooperative vs. Competitive Multi-Agent Negotiations in Retail Electronic Commerce
A key lesson learned from economic and game theory research is that negotiation protocols have substantial, rippling effects on the overall nature of the system. online auctions a...
Robert H. Guttman, Pattie Maes
115
Voted
COMPSAC
2009
IEEE
15 years 7 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
141
Voted
AUSDM
2006
Springer
157views Data Mining» more  AUSDM 2006»
15 years 7 months ago
Safely Delegating Data Mining Tasks
Data mining is playing an important role in decision making for business activities and governmental administration. Since many organizations or their divisions do not possess the...
Ling Qiu, Kok-Leong Ong, Siu Man Lui