Sciweavers

4529 search results - page 891 / 906
» Position Based Cryptography
Sort
View
SIGKDD
2002
232views more  SIGKDD 2002»
13 years 10 months ago
The True Lift Model - A Novel Data Mining Approach to Response Modeling in Database Marketing
In database marketing, data mining has been used extensively to find the optimal customer targets so as to maximize return on investment. In particular, using marketing campaign d...
Victor S. Y. Lo
TSE
1998
129views more  TSE 1998»
13 years 10 months ago
Inferring Declarative Requirements Specifications from Operational Scenarios
—Scenarios are increasingly recognized as an effective means for eliciting, validating, and documenting software requirements. This paper concentrates on the use of scenarios for...
Axel van Lamsweerde, Laurent Willemet
TPDS
2002
127views more  TPDS 2002»
13 years 10 months ago
Adaptive Bandwidth Reservation and Admission Control in QoS-Sensitive Cellular Networks
How to keep the probability of hand-off drops within a prespecified limit is a very important Quality-of-Service (QoS) issue in cellular networks because mobile users should be abl...
Sunghyun Choi, Kang G. Shin
TROB
2002
138views more  TROB 2002»
13 years 10 months ago
Interference-free polyhedral configurations for stacking
This paper uses a configuration space ( -space) based method to compute interference-free configuration for stacking polyhedral sheet metal parts. This work forms the interference ...
Venkateswara R. Ayyadevara, David A. Bourne, Kenji...
VC
2002
215views more  VC 2002»
13 years 10 months ago
Acquiring, stitching and blending diffuse appearance attributes on 3D models
A new system for the construction of highly realistic models of real free-form 3D objects is proposed, based on the integration of several techniques (automatic 3D scanning, inver...
Claudio Rocchini, Paolo Cignoni, Claudio Montani, ...