Sciweavers

3305 search results - page 213 / 661
» Can we Rely on SQL
Sort
View
HICSS
2006
IEEE
138views Biometrics» more  HICSS 2006»
14 years 4 months ago
Explaining ICT Infrastructure and E-Commerce Uses and Benefits in Industrial Clusters: Evidence from a Biotech Cluster
The literature on industrial clusters has not focused heavily on the role of the ICT infrastructure, nor on the potential implications of electronic commerce . In this paper, we e...
Charles Steinfield, Ada Scupola
ICMCS
2006
IEEE
163views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Methods for None Intrusive Delay Measurment for Audio Communication over Packet Networks
Measurement of the delay is an important and common problem in communication over packet networks. The endto-end and the round trip delay are among the factors directly impacting ...
Mohammad Zad-issa, Norbert Rossello, Laurent Pilat...
IWPC
2006
IEEE
14 years 4 months ago
Dynamic Analysis of Software Systems using Execution Pattern Mining
Software system analysis for extracting system functionality remains as a major problem in the reverse engineering literature and the early approaches mainly rely on static proper...
Hossein Safyallah, Kamran Sartipi
LCN
2005
IEEE
14 years 4 months ago
Fault Tolerant Active Rings for Structured Peer-to-Peer Overlays
Algorithms by which peers join and leave structured overlay networks can be classified as passive or active. Passive topology maintenance relies on periodic background repair of n...
John Risson, Ken Robinson, Tim Moors
CIKM
2005
Springer
14 years 4 months ago
Establishing value mappings using statistical models and user feedback
In this paper, we present a “value mapping” algorithm that does not rely on syntactic similarity or semantic interpretation of the values. The algorithm first constructs a st...
Jaewoo Kang, Tae Sik Han, Dongwon Lee, Prasenjit M...