Sciweavers

2552 search results - page 79 / 511
» Development of an evaluation model for Question Answering Sy...
Sort
View
NETWORKING
2011
12 years 10 months ago
Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point
Short-range, point-to-point communications for mobile users enjoy increasing popularity, particularly with the rise in Bluetooth-equipped mobile devices. Unfortunately, virus write...
Nicholas Valler, B. Aditya Prakash, Hanghang Tong,...
HICSS
2003
IEEE
359views Biometrics» more  HICSS 2003»
14 years 1 months ago
Assessing the Readiness of Firms for CRM: A Literature Review and Research Model
The concept of customer relationship management (CRM) resonates with managers in today's competitive economy. Yet recent articles in the business press have described CRM imp...
Rosalie J. Ocker, Susan Mudambi
IADIS
2008
13 years 9 months ago
Ajax-Based E-Learning System
An e-learning system based on Ajax has been developed. Ajax enables Web users to upload user commands and download new information without the need for a page refresh. Various e-l...
Mami Tanimoto, Yoshiaki Shikata
CCR
2008
86views more  CCR 2008»
13 years 7 months ago
The need for simulation in evaluating anomaly detectors
Anomalous events that affect the performance of networks are a fact of life. It is therefore not surprising that recent years have seen an explosion in research on network anomaly...
Haakon Ringberg, Matthew Roughan, Jennifer Rexford
COMPSAC
2006
IEEE
14 years 1 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale