Sciweavers

507 search results - page 98 / 102
» Defensive Marketing Strategies
Sort
View
GECCO
2004
Springer
179views Optimization» more  GECCO 2004»
14 years 1 months ago
An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System
Abstract. The need for supporting CSCW applications with heterogeneous and varying user requirements calls for adaptive and reconfigurable schedulers accommodating a mixture of re...
Horst Wedde, Muddassar Farooq, Mario Lischka
PDP
2003
IEEE
14 years 27 days ago
QoS-aware Accounting in Mobile Computing Scenarios
The enlarging market of portable devices and wireless networks stimulates the provisioning of mobilityenabled Internet services with differentiated levels of Quality of Service (Q...
Paolo Bellavista, Antonio Corradi, Silvia Vecchi
EDBT
2009
ACM
166views Database» more  EDBT 2009»
14 years 8 days ago
Neighbor-based pattern detection for windows over streaming data
The discovery of complex patterns such as clusters, outliers, and associations from huge volumes of streaming data has been recognized as critical for many domains. However, patte...
Di Yang, Elke A. Rundensteiner, Matthew O. Ward
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
14 years 6 days ago
Probabilistic latent semantic user segmentation for behavioral targeted advertising
Behavioral Targeting (BT), which aims to deliver the most appropriate advertisements to the most appropriate users, is attracting much attention in online advertising market. A ke...
Xiaohui Wu, Jun Yan, Ning Liu, Shuicheng Yan, Ying...
SIGUCCS
2000
ACM
13 years 12 months ago
Implementing LIES (Location Independent Email Service)
This paper will provide a useful guide to those schools that have not yet implemented IMAP and are considering doing so. With both the systems and user services perspectives, any ...
Pamela Vogel, John Spadaro