Sciweavers

1974 search results - page 65 / 395
» Conditional Purchase Orders
Sort
View
CISC
2006
Springer
124views Cryptology» more  CISC 2006»
15 years 1 months ago
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provid...
Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon...
ECOWS
2006
Springer
15 years 1 months ago
Maintaining Consistency between Loosely Coupled Services in the Presence of Timing Constraints and Validation Errors
Loose coupling is often cited as a defining characteristic of service-oriented architectures. Interactions between services take place via messages in an asynchronous environment ...
Carlos Molina-Jiménez, Santosh K. Shrivasta...
ACSAC
2001
IEEE
15 years 1 months ago
Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing
Distributed Denial of Service (DDoS) attacks exploit the acute imbalance between client and server workloads to cause devastation to the service providers. We propose a distribute...
David Mankins, Rajesh Krishnan, Ceilyn Boyd, John ...
CSREAEEE
2006
175views Business» more  CSREAEEE 2006»
14 years 11 months ago
A Time-Based Recommender System Using Implicit Feedback
- Recommender systems provide personalized recommendations on products or services to customers. Collaborative filtering is a widely used method of providing recommendations based ...
Tong-Queue Lee, Young Park
WSC
1997
14 years 11 months ago
Requirements for Transitioning Business Process Simulation Models to Real-Time Operational Systems
The value of modeling and simulating business processes has recently received increased attention with the interest in business process re-engineering (BPR). Many re-engineering p...
Peter Floss