Sciweavers

6025 search results - page 1123 / 1205
» Flexibility in Service Processes
Sort
View
CACM
2006
58views more  CACM 2006»
15 years 27 days ago
What is your software worth?
This article presents a method for valuing software, based on the income that use of that software is expected to generate in the future. It applies well known principles of intel...
Gio Wiederhold
96
Voted
CORR
2006
Springer
103views Education» more  CORR 2006»
15 years 26 days ago
VXA: A Virtual Architecture for Durable Compressed Archives
Data compression algorithms change frequently, and obsolete decoders do not always run on new hardware and operating systems, threatening the long-term usability of content archiv...
Bryan Ford
97
Voted
EOR
2006
81views more  EOR 2006»
15 years 25 days ago
Optimal and near-optimal policies for lost sales inventory models with at most one replenishment order outstanding
In this paper we use policy-iteration to explore the behaviour of optimal control policies for lost sales inventory models with the constraint that not more than one replenishment...
Roger M. Hill, Søren Glud Johansen
108
Voted
IJNSEC
2008
117views more  IJNSEC 2008»
15 years 25 days ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
CG
2007
Springer
15 years 25 days ago
Semantic lenses: Seamless augmentation of web pages with context information from implicit queries
We propose a novel method to support analytical processes by visually integrating context information directly into web pages. The context information is obtained from knowledge b...
Martin Rotard, Mark Giereth, Thomas Ertl
« Prev « First page 1123 / 1205 Last » Next »