Sciweavers

29 search results - page 3 / 6
» A Theoretical Study of 'Snapshot Isolation'
Sort
View
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
13 years 11 months ago
SME E-Procurement Adoption in Hong Kong - The Roles of Power, Trust and Value
The objective of this research is to test a model of electronic procurement (e-procurement) adoption behavior by Small- to Medium-sized Enterprises (SME). We investigate the pheno...
Joyce K. Y. Chan, Matthew K. O. Lee
CONEXT
2009
ACM
13 years 6 months ago
Exploiting dynamicity in graph-based traffic analysis: techniques and applications
Network traffic can be represented by a Traffic Dispersion Graph (TDG) that contains an edge between two nodes that send a particular type of traffic (e.g., DNS) to one another. T...
Marios Iliofotou, Michalis Faloutsos, Michael Mitz...
ERSHOV
2003
Springer
13 years 11 months ago
Principles for Entity Authentication
We study the roles of message components in authentication protocols. In particular, we investigate how a certain component contributes to the task of achieving entity authenticati...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
ROBOCUP
2009
Springer
134views Robotics» more  ROBOCUP 2009»
14 years 9 days ago
Learning Complementary Multiagent Behaviors: A Case Study
As the reach of multiagent reinforcement learning extends to more and more complex tasks, it is likely that the diverse challenges posed by some of these tasks can only be address...
Shivaram Kalyanakrishnan, Peter Stone
JCC
2010
87views more  JCC 2010»
13 years 4 months ago
Crystal contacts as nature's docking solutions
The assumption that crystal contacts reflect natural macromolecular interactions makes a basis for many studies in structural biology. However, the crystal state may correspond t...
Evgeny B. Krissinel