Sciweavers

3374 search results - page 516 / 675
» Explaining Similarity of Terms
Sort
View
CSREASAM
2006
15 years 5 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
ECIS
2004
15 years 5 months ago
Selling Packaged Software: An Ethical Analysis
Within the IS literature there is little discussion on selling software products in general and especially from the ethical point of view. Similarly, within computer ethics, altho...
Alison Adam, Ben Light
DGO
2006
112views Education» more  DGO 2006»
15 years 5 months ago
Matching and integration across heterogeneous data sources
A sea of undifferentiated information is forming from the body of data that is collected by people and organizations, across government, for different purposes, at different times...
Patrick Pantel, Andrew Philpot, Eduard H. Hovy
DGO
2006
148views Education» more  DGO 2006»
15 years 5 months ago
Automatically labeling hierarchical clusters
Government agencies must often quickly organize and analyze large amounts of textual information, for example comments received as part of notice and comment rulemaking. Hierarchi...
Pucktada Treeratpituk, Jamie Callan
FORTE
2004
15 years 5 months ago
A Minimal Market Model in Ephemeral Markets
Abstract Peer-to-peer markets going mobile spur spontaneity in trading considerably. Spontaneity, however, imposes severe informational requirements on the market participants. Inf...
Daniel Rolli, Dirk Neumann, Christof Weinhardt