Sciweavers

4944 search results - page 690 / 989
» From XML to Relational Models
Sort
View
CCS
2001
ACM
15 years 9 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel
IFIP
2001
Springer
15 years 9 months ago
Translation, Betrayal and Ambiguity in IS Development
This paper uses semiotic theories to model how meaning is constructed during an IS development project. Conventionally, shared meanings among all project stakeholders are regarded...
Jim Underwood
ICC
2000
IEEE
15 years 9 months ago
A Framework for the Analysis of Adaptive Voice over IP
— In this paper, we present a framework for the analysis of a set of adaptive variable-bit-rate voice sources in a packet network. The instantaneous bit rate of each source is de...
Claudio Casetti, J. C. De Martin, Michela Meo
SIGECOM
2000
ACM
155views ECommerce» more  SIGECOM 2000»
15 years 9 months ago
Competitive bundling of categorized information goods
We introduce an information bundling model that addresses two important but relatively unstudied issues in real markets for information goods: automated customization of content b...
Jeffrey O. Kephart, Scott A. Fay
SIGIR
2010
ACM
15 years 8 months ago
How good is a span of terms?: exploiting proximity to improve web retrieval
Ranking search results is a fundamental problem in information retrieval. In this paper we explore whether the use of proximity and phrase information can improve web retrieval ac...
Krysta Marie Svore, Pallika H. Kanani, Nazan Khan