Sciweavers

18697 search results - page 3708 / 3740
» Systemic Security Management
Sort
View
WSC
2007
15 years 6 months ago
A model for contact center analysis and simulation
In this paper we depart from a set of simple assumptions regarding the behavior of a pool of customers associated with an enterprise’s contact center. We assume that the pool of...
Juan M. Huerta
AOSD
2008
ACM
15 years 6 months ago
Support for distributed adaptations in aspect-oriented middleware
Many aspect-oriented middleware platforms support run-time aspect weaving, but do not support coordinating distributed changes to a set of aspects at run-time. A distributed chang...
Eddy Truyen, Nico Janssens, Frans Sanen, Wouter Jo...
148
Voted
EDBT
2010
ACM
210views Database» more  EDBT 2010»
15 years 6 months ago
Keyword search for data-centric XML collections with long text fields
Users who are unfamiliar with database query languages can search XML data sets using keyword queries. Current approaches for supporting such queries are either for textcentric XM...
Arash Termehchy, Marianne Winslett
136
Voted
ATAL
2008
Springer
15 years 6 months ago
A context-aware personal desktop assistant
We demonstrate an intelligent personal assistant agent that has been developed to aid a busy knowledge worker in managing time commitments and performing tasks. The PExA agent dra...
Hung Hai Bui, Federico Cesari, Daniel Elenius, Dav...
CIKM
2008
Springer
15 years 6 months ago
To swing or not to swing: learning when (not) to advertise
Web textual advertising can be interpreted as a search problem over the corpus of ads available for display in a particular context. In contrast to conventional information retrie...
Andrei Z. Broder, Massimiliano Ciaramita, Marcus F...
« Prev « First page 3708 / 3740 Last » Next »