Sciweavers

613 search results - page 92 / 123
» A Knowledge-Based Approach for Designing Robust Business Pro...
Sort
View
ACMICEC
2003
ACM
118views ECommerce» more  ACMICEC 2003»
15 years 5 months ago
Visualization of EDI messages: facing the problems in the use of XML
Multi-organizational EDI message networks are complicated communication environments with various standards and technologies. The role of third party message exchange hubs has bec...
Reija Korhonen, Airi Salminen
FC
2004
Springer
89views Cryptology» more  FC 2004»
15 years 5 months ago
Electronic National Lotteries
We describe the design and implementation of secure and robust protocol and system for a national electronic lottery. Electronic lotteries at a national level are a viable cost eď¬...
Elisavet Konstantinou, Vasiliki Liagkou, Paul G. S...
CASCON
2008
137views Education» more  CASCON 2008»
15 years 1 months ago
Automating SLA modeling
Service Level Agreements (SLAs) define the level of service that a service provider must deliver. An SLA is a contract between service provider and consumer, and includes appropri...
Tony Chau, Vinod Muthusamy, Hans-Arno Jacobsen, El...
JSW
2007
185views more  JSW 2007»
14 years 11 months ago
A Decision Support System base line Flexible Architecture to Intrusion Detection
—Becoming more competitive and more effective in the current scenes of Business and Public Administration, the organizations must be able to approach easily and quickly to the in...
Marcello Castellano, Giuseppe Mastronardi, Angela ...
76
Voted
ICASSP
2008
IEEE
15 years 6 months ago
Toward a detector-based universal phone recognizer
In recent research, we have proposed a high-accuracy bottom-up detection-based paradigm for continuous phone speech recognition. The key component of our system was a bank of arti...
Sabato Marco Siniscalchi, Torbjørn Svendsen...