Sciweavers

12697 search results - page 8 / 2540
» Call for Papers
Sort
View
DSN
2005
IEEE
14 years 1 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
IEAAIE
2004
Springer
14 years 1 months ago
Data Mining Approach for Analyzing Call Center Performance
Abstract. The aim of our research was to apply well-known data mining techniques (such as linear neural networks, multi-layered perceptrons, probabilistic neural networks, classifi...
Marcin Paprzycki, Ajith Abraham, Ruiyuan Guo, Srin...
WSC
2007
13 years 10 months ago
Partial cross training in call centers with uncertain arrivals and global service level agreements
Inbound call center operations are challenging to manage; there is considerable uncertainty in estimates of arrival rates, and the operation is often subject to strict service lev...
Thomas R. Robbins, Terry P. Harrison, Deborah J. M...
MANSCI
2008
62views more  MANSCI 2008»
13 years 7 months ago
Service-Level Agreements in Call Centers: Perils and Prescriptions
A call center with both contract and non-contract customers was giving priority to the contract customers only in off-peak hours, precisely when having priority was least importan...
Joseph M. Milner, Tava Lennon Olsen
DAGSTUHL
2003
13 years 9 months ago
Policies: Giving Users Control over Calls
Abstract. Features provide extensions to a basic service, but in new systems users require much greater flexibility oriented towards their needs. Traditional features do not easil...
Stephan Reiff-Marganiec