Sciweavers

23098 search results - page 4552 / 4620
» Component Based Development
Sort
View
KAIS
2008
150views more  KAIS 2008»
13 years 9 months ago
A survey on algorithms for mining frequent itemsets over data streams
The increasing prominence of data streams arising in a wide range of advanced applications such as fraud detection and trend learning has led to the study of online mining of freq...
James Cheng, Yiping Ke, Wilfred Ng
ECR
2007
116views more  ECR 2007»
13 years 9 months ago
Enabling assisted strategic negotiations in actual-world procurement scenarios
In the everyday business world, the sourcing process of multiple goods and services usually involves complex negotiations (via telephone, fax, etc) that include discussion of prod...
Jesús Cerquides, Maite López-S&aacut...
JMM2
2006
151views more  JMM2 2006»
13 years 9 months ago
On the Use of External Face Features for Identity Verification
Abstract-- In general automatic face classification applications images are captured in natural environments. In these cases, the performance is affected by variations in facial im...
Àgata Lapedriza, David Masip, Jordi Vitri&a...
JOT
2006
73views more  JOT 2006»
13 years 9 months ago
The Initium RJS ScreenSaver: Part 2, UNIX
This paper describes a Java-based screensaver technology for the Initium Remote Job Submission (RJS) system running on UNIX XWindows. Initium RJS is a Java Web Start (JAWS) techno...
Douglas A. Lyon, Francisco Castellanos
JSAC
2006
181views more  JSAC 2006»
13 years 9 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
« Prev « First page 4552 / 4620 Last » Next »