Sciweavers

180 search results - page 31 / 36
» A Recommender System based on the Immune Network
Sort
View
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
14 years 10 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
ESI
2010
93views more  ESI 2010»
14 years 10 months ago
VxOware: software for managing virtual observatory metadata
The recent Heliophysics Virtual Observatory (VxO) effort involves the development of separate observatories with a low overlap in physical domain or area of scientific specializat...
Robert S. Weigel, Mikhail N. Zhizhin, Dmitry Mishi...
IFIP
2010
Springer
14 years 9 months ago
Drivers of B2B Software Purchase Decisions
. Organizations are increasingly turning to large, enterprise-wide software systems as potential solutions to managing complex business-to-business (B2B) relationships. These syste...
Claudia Loebbecke, Thomas Weiss, Philip Powell, Ch...
79
Voted
PET
2009
Springer
15 years 6 months ago
On the Optimal Placement of Mix Zones
Abstract. In mobile wireless networks, third parties can track the location of mobile nodes by monitoring the pseudonyms used for identification. A frequently proposed solution to...
Julien Freudiger, Reza Shokri, Jean-Pierre Hubaux
110
Voted
AICCSA
2008
IEEE
283views Hardware» more  AICCSA 2008»
15 years 6 months ago
Performance analysis of identity management in the Session Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) is a standard for managing IP multimedia sessions in the Internet. Identity management in SIP is a crucial security field that deals with id...
Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguy...