Sciweavers

493 search results - page 42 / 99
» Service Systems as Customer-Intensive Systems and Its Implic...
Sort
View
COMSWARE
2006
IEEE
14 years 1 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
ADL
2000
Springer
284views Digital Library» more  ADL 2000»
14 years 22 hour ago
A Boolean Query Processing with a Result Cache in Mediator Systems
A mediator system is a kind of a meta-search engine that provides a seamlessly integrated search service for diverse search engines (collections). Since collections of a mediator ...
Jae-Heon Cheong, Sang-goo Lee
GIS
2008
ACM
14 years 8 months ago
GISolve toolkit: advancing GIS through cyberinfrastructure
Cyberinfrastructure integrates information and communication technologies to enable high-performance, distributed, and collaborative knowledge discovery, and promises to revolutio...
Shaowen Wang
WWW
2004
ACM
14 years 8 months ago
The interoperability of learning object repositories and services: standards, implementations and lessons learned
Interoperability is one of the main issues in creating a networked system of repositories. The eduSource project in its holistic approach to building a network of learning object ...
Marek Hatala, Griff Richards, Timmy Eap, Jordan Wi...
EUROMICRO
2004
IEEE
13 years 11 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour