Sciweavers

220 search results - page 24 / 44
» Trusted business system model using context sensitiveness
Sort
View
IQ
2001
13 years 9 months ago
Information Envelope and its Information Integrity Implications
: Physical and informational works are strongly interrelated in a business process. This facilitates modeling a business process as an integral part of a closed loop information an...
Vijay V. Mandke, Madhavan K. Nayar, Kamna Malik
AIPRF
2008
13 years 9 months ago
Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
HICSS
2003
IEEE
136views Biometrics» more  HICSS 2003»
14 years 28 days ago
Value Positions for Financial Institutions in Electronic Bill Presentment and Payment (EBPP)
Business to consumer (B2C) electronic commerce has led to new relationships connecting various supply chain partners via the Internet, significantly increasing the quantity and qu...
Alea M. Fairchild
ANSS
2002
IEEE
14 years 18 days ago
Simulation of a Vehicle Traffic Control Network Using a Fuzzy Classifier System
A Complex Adaptive System (CAS) is a network of communicating, intelligent agents where each agent adapts its behavior in order to collaborate with other agents to achieve overall...
John R. Clymer
CDC
2008
IEEE
125views Control Systems» more  CDC 2008»
13 years 9 months ago
Application of real rational modules in system identification
This paper introduces a real rational module framework in the context of Prediction Error Identification using Box-Jenkins model structures. This module framework, which can easily...
Tzvetan Ivanov, Pierre-Antoine Absil, Brian D. O. ...