Sciweavers

759 search results - page 105 / 152
» What Can Be Implemented Anonymously
Sort
View
HICSS
2002
IEEE
100views Biometrics» more  HICSS 2002»
14 years 2 months ago
XML-Based Supply Chain Management--As SIMPLEX as It Is
In this paper we want to examine, to what extent XML is able to support the exchange of business documents in supply chains. Thereby we focus on the problem of converting differen...
Peter Buxmann, Luis Martín Díaz, Eri...
ICTAI
2002
IEEE
14 years 2 months ago
Context Query in Information Retrieval
It is observed that there is an important query requirement missing for search engines. With the wide variation of domain knowledge and user's interest, a user would like to ...
Chi-Hung Chi, Chen Ding, Kwok-Yan Lam
ATAL
2001
Springer
14 years 2 months ago
KSACI: A Handheld Device Infrastructure for Agents Communication
The recent development of software platforms for cell phones and handheld computers, such as Java 2 Micro Edition (J2ME), has broadened application perspectives in this area. In fa...
Ryan L. Albuquerque, Jomi Fred Hübner, Gustav...
CIA
2001
Springer
14 years 2 months ago
Equilibria Strategies for Selecting Sellers and Satisfying Buyers
We consider marketplaces where buyers and sellers iteratively encounter to trade. Given some specific trade conditions, the question that we address is what strategies should buy...
Claudia V. Goldman, Sarit Kraus, Onn Shehory
ICSE
2001
IEEE-ACM
14 years 2 months ago
Designing Components Versus Objects: A Transformational Approach
A good object-oriented design does not necessarily make a good component-based design, and vice versa. What design principles do components introduce? This paper examines componen...
David H. Lorenz, John M. Vlissides