Sciweavers

467 search results - page 84 / 94
» Online Auction Demand
Sort
View
SOUPS
2010
ACM
13 years 11 months ago
Where do security policies come from?
We examine the password policies of 75 different websites. Our goal is understand the enormous diversity of requirements: some will accept simple six-character passwords, while o...
Dinei A. F. Florêncio, Cormac Herley
CIDM
2007
IEEE
13 years 7 months ago
SSM : A Frequent Sequential Data Stream Patterns Miner
Data stream applications like sensor network data, click stream data, have data arriving continuously at high speed rates and require online mining process capable of delivering c...
C. I. Ezeife, Mostafa Monwar
JCIT
2007
132views more  JCIT 2007»
13 years 7 months ago
Analysis and Implementation of M-commerce in Education for Developing Countries (Uzbekistan case)
M-commerce is one of the ways IT can significantly contribute to boosting economy of the developing countries. M-commerce project has a high potential in the developing countries ...
Olga Yugay, Aleksey Semyonov, Il Seok Ko, Sarvar R...
SIGCOMM
2012
ACM
11 years 10 months ago
Optimizing cost and performance for content multihoming
Many large content publishers use multiple content distribution networks to deliver their content, and many industrial systems have become available to help a broader set of conte...
Hongqiang Harry Liu, Ye Wang, Yang Richard Yang, H...
COMSWARE
2006
IEEE
14 years 1 months ago
Resource management in heterogenous wireless networks with overlapping coverage
— Development in new radio technologies and increase in user demands are driving the deployment of a wide array of wireless networks, ranging from 802.11 networks in the local ar...
Bin Bin Chen, Mun Choon Chan