Sciweavers

275 search results - page 44 / 55
» The Internet Enterprise
Sort
View
WOWMOM
2009
ACM
166views Multimedia» more  WOWMOM 2009»
14 years 2 months ago
Business opportunities and considerations on wireless mesh networks
Wireless broadband and Metro WiFi are sweeping through municipalities, campuses, enterprises and public safety organizations creating a buzz of excitement and anticipation unseen ...
George Vasilakis, George Perantinos, Ioannis G. As...
CIMCA
2008
IEEE
14 years 2 months ago
Deploying Neural-Network-Based Models for Dynamic Pricing in Supply Chain Management
With the advent of e-Commerce, enterprises can no longer rely on static business strategies. They have to be able to cope in dynamic and uncertain electronic environments, especia...
Yevgeniya Kovalchuk, Maria Fasli
AINA
2007
IEEE
14 years 2 months ago
Un-biasing the Link Farm Effect in PageRank Computation
Link analysis is a critical component of current Internet search engines' results ranking software, which determines the ordering of query results returned to the user. The o...
Arnon Rungsawang, Komthorn Puntumapon, Bundit Mana...
ESORICS
2007
Springer
14 years 1 months ago
Change-Impact Analysis of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall directly...
Alex X. Liu
ISCC
2006
IEEE
104views Communications» more  ISCC 2006»
14 years 1 months ago
Stable High-Capacity One-Hop Distributed Hash Tables
Most research on Distributed Hash Tables (DHTs) assumes ephemeral, lightly loaded deployments. Each node has a lifetime of a few hours and initiates a lookup once every few second...
John Risson, Aaron Harwood, Tim Moors