Sciweavers

718 search results - page 73 / 144
» From decision theory to decision aiding methodology
Sort
View
WOA
2001
14 years 11 months ago
How to Support Adaptive Mobile Applications
The Mobile Agent (MA) paradigm seems to be a promising solution for the design and development of distributed value-added services. However, mobility has added complexity to the d...
Antonio Corradi, Rebecca Montanari, Gianluca Tonti...
ESWA
2006
243views more  ESWA 2006»
14 years 9 months ago
Knowledge based crime scenario modelling
A crucial concern in the evaluation of evidence related to a major crime is the formulation of sufficient alternative plausible scenarios that can explain the available evidence. ...
Jeroen Keppens, Burkhard Schafer
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
13 years 6 days ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
ESANN
2004
14 years 11 months ago
Data Mining Techniques on the Evaluation of Wireless Churn
This work focuses on one of the most critical issues to plague the wireless telecommunications industry today: the loss of a valuable subscriber to a competitor, also defined as ch...
Jorge Ferreira, Marley B. R. Vellasco, Marco Aur&e...
SMC
2007
IEEE
137views Control Systems» more  SMC 2007»
15 years 4 months ago
Cooperative mixed strategy for service selection in service oriented architecture
—In Service Oriented Architecture (SOA), service brokers could find many service providers which offer same function with different quality of service (QoS). Under this condition...
Yimin Shen, Yushun Fan