Sciweavers

35419 search results - page 128 / 7084
» How are we doing
Sort
View
151
Voted
JIIS
2006
76views more  JIIS 2006»
15 years 3 months ago
Holes in joins
A join of two relations in real databases is usually much smaller than their cartesian product. This means that most of the combinations of tuples in the crossproduct of the respe...
Jarek Gryz, Dongming Liang
137
Voted
HICSS
2007
IEEE
133views Biometrics» more  HICSS 2007»
15 years 10 months ago
The Co-evolution of Design and User Requirements in Knowledge Management Systems: The Case of Patent Management Systems
Do the design requirements of a knowledge management system change over time? If so, how do these changes affect the users of the system? In this paper we explore the case of pate...
Tony Briggs, Bala Iyer, Paul Carlile
127
Voted
MOBIHOC
2007
ACM
16 years 3 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
175
Voted
AGENTCL
2003
Springer
15 years 9 months ago
A Cooperative Dialogue Game for Resolving Ontological Discrepancies
The goal of this paper is to present a computational framework that enables us to generate elementary speech act sequences in a dialogue between an electronic assistant and a compu...
Robbert-Jan Beun, Rogier M. van Eijk
ICIS
2000
15 years 5 months ago
Economic returns to firms from business-to-business electronic commerce initiatives: an empirical examination
Do firms derive economic returns from business-to-business(B2B) initiatives? How do returns to startup firms compare to those for established firms in B2B initiatives? How do retu...
Mani R. Subramani, Eric Walden