Sciweavers

493 search results - page 69 / 99
» Service Systems as Customer-Intensive Systems and Its Implic...
Sort
View
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
14 years 1 months ago
e-Government and Cyber Security: The Role of Cyber Security Exercises
e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce soluti...
Art Conklin, Gregory B. White
WWW
2008
ACM
14 years 8 months ago
Finding core members in virtual communities
Finding the core members of a virtual community is an important problem in community analysis. Here we presented an simulated annealing algorithm to solve this problem by optimizi...
Haiqiang Chen, Xueqi Cheng, Yue Liu
CHI
2010
ACM
14 years 2 months ago
Short and tweet: experiments on recommending content from information streams
More and more web users keep up with newest information through information streams such as the popular microblogging website Twitter. In this paper we studied content recommendat...
Jilin Chen, Rowan Nairn, Les Nelson, Michael Berns...
NOMS
2000
IEEE
138views Communications» more  NOMS 2000»
13 years 12 months ago
Policy-based hybrid management architecture for IP-based VPN
Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main techn...
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, Ta...
ICDM
2010
IEEE
121views Data Mining» more  ICDM 2010»
13 years 5 months ago
Recommending Social Events from Mobile Phone Location Data
A city offers thousands of social events a day, and it is difficult for dwellers to make choices. The combination of mobile phones and recommender systems can change the way one de...
Daniele Quercia, Neal Lathia, Francesco Calabrese,...