Sciweavers

507 search results - page 98 / 102
» Defensive Marketing Strategies
Sort
View
GECCO
2004
Springer
179views Optimization» more  GECCO 2004»
15 years 3 months ago
An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System
Abstract. The need for supporting CSCW applications with heterogeneous and varying user requirements calls for adaptive and reconfigurable schedulers accommodating a mixture of re...
Horst Wedde, Muddassar Farooq, Mario Lischka
PDP
2003
IEEE
15 years 2 months ago
QoS-aware Accounting in Mobile Computing Scenarios
The enlarging market of portable devices and wireless networks stimulates the provisioning of mobilityenabled Internet services with differentiated levels of Quality of Service (Q...
Paolo Bellavista, Antonio Corradi, Silvia Vecchi
97
Voted
EDBT
2009
ACM
166views Database» more  EDBT 2009»
15 years 2 months ago
Neighbor-based pattern detection for windows over streaming data
The discovery of complex patterns such as clusters, outliers, and associations from huge volumes of streaming data has been recognized as critical for many domains. However, patte...
Di Yang, Elke A. Rundensteiner, Matthew O. Ward
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
15 years 2 months ago
Probabilistic latent semantic user segmentation for behavioral targeted advertising
Behavioral Targeting (BT), which aims to deliver the most appropriate advertisements to the most appropriate users, is attracting much attention in online advertising market. A ke...
Xiaohui Wu, Jun Yan, Ning Liu, Shuicheng Yan, Ying...
SIGUCCS
2000
ACM
15 years 2 months ago
Implementing LIES (Location Independent Email Service)
This paper will provide a useful guide to those schools that have not yet implemented IMAP and are considering doing so. With both the systems and user services perspectives, any ...
Pamela Vogel, John Spadaro