Sciweavers

1411 search results - page 23 / 283
» Case Studies of an Insider Framework
Sort
View
IJNVO
2011
47views more  IJNVO 2011»
13 years 2 months ago
Harvesting covert networks: a case study of the iMiner database
: Data collection of covert networks is an inherently difficult task because of the very nature of these networks. Researchers find it difficult to locate and access data relating ...
Nasrullah Memon, Uffe Kock Wiil, Reda Alhajj, Clau...
IPPS
2007
IEEE
14 years 1 months ago
Model-Guided Empirical Optimization for Multimedia Extension Architectures: A Case Study
Compiler technology for multimedia extensions must effectively utilize not only the SIMD compute engines but also the various levels of the memory hierarchy: superword registers,...
Chun Chen, Jaewook Shin, Shiva Kintali, Jacqueline...
EMNLP
2008
13 years 9 months ago
Scalable Language Processing Algorithms for the Masses: A Case Study in Computing Word Co-occurrence Matrices with MapReduce
This paper explores the challenge of scaling up language processing algorithms to increasingly large datasets. While cluster computing has been available in commercial environment...
Jimmy J. Lin
IADIS
2004
13 years 9 months ago
Marketing capability and E-business performance: a case study of a retail bank
This paper addresses the significance of marketing capability for e-business performance in retail banking. A conceptual framework was built on the marketing and strategic managem...
Helena Ahola, Johanna Ahola
JCP
2007
122views more  JCP 2007»
13 years 7 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta