Sciweavers

7961 search results - page 1326 / 1593
» Data Integration with Uncertainty
Sort
View
95
Voted
HICSS
2008
IEEE
187views Biometrics» more  HICSS 2008»
15 years 7 months ago
Relational Risk Mitigation: The Relationship Approach to Mitigating Risks in Business Process Outsourcing
Managing risks in outsourcing has been widely researched but is still not fully understood by either academics or practitioners. Recent research on IS outsourcing relationships ha...
Kim Wüllenweber, Stefanie Jahner, Helmut Krcm...
101
Voted
ICASSP
2008
IEEE
15 years 7 months ago
Graph laplacian for interactive image retrieval
Interactive image search or relevance feedback is the process which helps a user refining his query and finding difficult target categories. This consists in a step-by-step lab...
Hichem Sahbi, Patrick Etyngier, Jean-Yves Audibert...
ICC
2008
IEEE
106views Communications» more  ICC 2008»
15 years 7 months ago
Multicast with an Application-Oriented Networking (AON) Approach
Abstract—This paper proposes an efficient and scalable multicast scheme based on the concept of application-oriented networking (AON). The traditional IP multicast is bandwidth ...
Xiaohua Tian, Yu Cheng, Kui Ren, Bin Liu
95
Voted
ICCCN
2008
IEEE
15 years 7 months ago
Fingerprint-Based Location Estimation with Virtual Access Points
— Location fingerprinting techniques generally make use of existing wireless network infrastructure. Consequently, the positions of the access points (APs), which constitute an ...
A. K. M. Mahtab Hossain, Hien Nguyen Van, Wee-Seng...
131
Voted
ICEIS
2008
IEEE
15 years 7 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
« Prev « First page 1326 / 1593 Last » Next »