Sciweavers

1852 search results - page 244 / 371
» From Bi-ideals to Periodicity
Sort
View
KDD
2005
ACM
107views Data Mining» more  KDD 2005»
14 years 3 months ago
Predicting the product purchase patterns of corporate customers
This paper describes TIPPPS (Time Interleaved Product Purchase Prediction System), which analyses billing data of corporate customers in a large telecommunications company in orde...
Bhavani Raskutti, Alan Herschtal
PET
2005
Springer
14 years 3 months ago
Privacy Vulnerabilities in Encrypted HTTP Streams
Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
George Dean Bissias, Marc Liberatore, David Jensen...
SSS
2005
Springer
132views Control Systems» more  SSS 2005»
14 years 3 months ago
Self-stabilizing Mobile Node Location Management and Message Routing
We present simple algorithms for achieving self-stabilizing location management and routing in mobile ad-hoc networks. While mobile clients may be susceptible to corruption and sto...
Shlomi Dolev, Limor Lahiani, Nancy A. Lynch, Tina ...
CSCW
2004
ACM
14 years 3 months ago
Maintaining redundancy in the coordination of medical emergencies
This paper reports from a study of Norwegian medical emergency call (AMK) centres, in which advanced radio and telephone communication technologies are handled by a team of nurses...
Aksel Tjora
JCDL
2004
ACM
106views Education» more  JCDL 2004»
14 years 3 months ago
Sharing encountered information: digital libraries get a social life
As part of a more extensive study of reading-related practices, we have explored how people share information they encounter in their everyday reading as a complement to the more ...
Catherine C. Marshall, Sara A. Bly