Sciweavers

7064 search results - page 1331 / 1413
» From States to Histories
Sort
View
SETA
2004
Springer
93views Mathematics» more  SETA 2004»
15 years 5 months ago
Spectral Orbits and Peak-to-Average Power Ratio of Boolean Functions with Respect to the {I, H, N}n Transform
We enumerate the inequivalent self-dual additive codes over GF(4) of blocklength n, thereby extending the sequence A090899 in The On-Line Encyclopedia of Integer Sequences from n =...
Lars Eirik Danielsen, Matthew G. Parker
SIGADA
2004
Springer
15 years 5 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
WKDD
2010
CPS
204views Data Mining» more  WKDD 2010»
15 years 5 months ago
A Scalable, Accurate Hybrid Recommender System
—Recommender systems apply machine learning techniques for filtering unseen information and can predict whether a user would like a given resource. There are three main types of...
Mustansar Ali Ghazanfar, Adam Prügel-Bennett
CITA
2003
IEEE
15 years 5 months ago
Internet Diffusion and E-Business Opportunities Amongst Malaysian Travel Agencies
This paper reports an investigation into the adoption of the Internet amongst Malaysian travel agencies as a means of exploring the likely future potential growth of e-business wi...
Raja Mazhatul Yasmin Suraya
COMPSAC
2003
IEEE
15 years 5 months ago
Just What Could Possibly Go Wrong In B2B Integration?
One important trend in enterprise-scale IT has been the increasing use of business-to-business integration (B2Bi) technologies to automate business processes that cross organisati...
Dean Kuo, Alan Fekete, Paul Greenfield, Julian Jan...
« Prev « First page 1331 / 1413 Last » Next »