Sciweavers

497 search results - page 76 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
JTAER
2007
125views more  JTAER 2007»
15 years 4 months ago
Australian Case Studies in Mobile Commerce
Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical m...
Jonathan O'Donnell, Margaret Jackson, Marita Shell...
EVOW
2010
Springer
15 years 11 months ago
WiMAX Network Planning Using Adaptive-Population-Size Genetic Algorithm
Abstract. IEEE 802.16, also known as WiMAX, is a new wireless access technology for currently increasing demand of wireless high-speed broadband service. Efficient and effective d...
Ting Hu, Yuanzhu Peter Chen, Wolfgang Banzhaf
CIKM
2009
Springer
15 years 10 months ago
Tree-pattern-based duplicate code detection
This paper presents a tree-pattern-based method of automatically and accurately finding code clones in program files. Duplicate tree-patterns are first collected by anti-unificati...
Hyo-Sub Lee, Kyung-Goo Doh
IV
2008
IEEE
112views Visualization» more  IV 2008»
15 years 10 months ago
Directions for Methodological Research in Information Visualization
—People within and outside the information visualization community are motivated to create new tools to address their own unique problems of understanding data. However, the tec...
Brock Craft, Paul A. Cairns
PPSWR
2005
Springer
15 years 9 months ago
A Geospatial World Model for the Semantic Web
The Semantic Web is an endeavour aiming at enhancing Web data with meta-data and data processing, as well as processing methods specifying the “meaning” of such data and allowi...
François Bry, Bernhard Lorenz, Hans Jü...