Sciweavers

1426 search results - page 91 / 286
» A theory of goal-oriented communication
Sort
View
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
15 years 8 months ago
CRM and Customer Portfolio Management for E-Tailers
“Don’t put all your eggs in one basket” is common wisdom with respect to financial portfolio theory. The configuration of customer portfolios with regard to appropriate risk...
Dennis Kundisch, Stefan Sackmann, Markus Ruch
ICICS
2007
Springer
15 years 7 months ago
Extending FORK-256 Attack to the Full Hash Function
Abstract. In a paper published in FSE 2007, a way of obtaining nearcollisions and in theory also collisions for the FORK-256 hash function was presented [8]. The paper contained ex...
Scott Contini, Krystian Matusiewicz, Josef Pieprzy...
GLOBECOM
2006
IEEE
15 years 7 months ago
A Game-Theoretic Framework for Interference Avoidance in Ad hoc Networks
It is shown in this paper that direct extensions of distributed greedy Interference Avoidance (IA) techniques for networks with centralized receivers to networks with multiple unc...
Rekha Menon, Allen B. MacKenzie, R. Michael Buehre...
HICSS
2005
IEEE
133views Biometrics» more  HICSS 2005»
15 years 7 months ago
User-Oriented Relevance Judgment: A Conceptual Model
The concept of relevance has been heatedly debated in last decade. Not satisfied with the narrow and technical definition of system relevance, researchers turn to the subjective a...
Zhiwei Chen, Yunjie Xu
SPAA
2005
ACM
15 years 7 months ago
Name independent routing for growth bounded networks
A weighted undirected network is ∆ growth-bounded if the number of nodes at distance 2r around any given node is at most ∆ times the number of nodes at distance r around the n...
Ittai Abraham, Dahlia Malkhi