Sciweavers

572 search results - page 104 / 115
» Reputation Management Survey
Sort
View
INFSOF
2008
98views more  INFSOF 2008»
13 years 7 months ago
Engineering contextual knowledge for autonomic pervasive services
Services for mobile and pervasive computing should extensively exploit contextual information both to adapt to user needs and to enable autonomic behavior. This raises the problem...
Gabriella Castelli, Marco Mamei, Franco Zambonelli
IJNSEC
2006
143views more  IJNSEC 2006»
13 years 7 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang
DSS
2007
106views more  DSS 2007»
13 years 7 months ago
An investigation of factors that influence the duration of IT outsourcing relationships
Past studies in the IT outsourcing area have examined the management of IT outsourcing relationships from a variety of perspectives. The present paper extends this line of researc...
Jahyun Goo, Rajiv Kishore, Kichan Nam, H. Raghav R...
JODL
2006
136views more  JODL 2006»
13 years 7 months ago
An experimental effectiveness comparison of methods for 3D similarity search
Methods for content-based similarity search are fundamental for managing large multimedia repositories, as they make it possible to conduct queries for similar content, and to orga...
Benjamin Bustos, Daniel A. Keim, Dietmar Saupe, To...
CORR
2002
Springer
105views Education» more  CORR 2002»
13 years 7 months ago
Petabyte Scale Data Mining: Dream or Reality?
Science is becoming very data intensive1 . Today's astronomy datasets with tens of millions of galaxies already present substantial challenges for data mining. In less than 1...
Alexander S. Szalay, Jim Gray, Jan vandenBerg