Sciweavers

1776 search results - page 118 / 356
» Informational cascades in IT adoption
Sort
View
ITRE
2005
IEEE
15 years 7 months ago
Securing RSVP and RSVP-TE signaling protocols and their performance study
RSVP and RSVP-TE are signaling protocols used to set up paths and/or support Quality of Service (QoS) requirements in IP and MPLS-based networks, respectively. This paper analyzes...
Jin Zhi, Chung-Horng Lung, Xia Xu, Anand Srinivasa...
TRIDENTCOM
2005
IEEE
15 years 7 months ago
Analysis and Experimentation over Heterogeneous Wireless Networks
Wireless and mobile networks represent an enabling technology for ubiquitous access to information systems. However, there are critical issues that still prevent the widespread us...
Massimo Bernaschi, Antonio Pescapè, Filippo...
WORDS
2005
IEEE
15 years 7 months ago
Towards a Flow Analysis for Embedded System C Programs
Reliable program Worst-Case Execution Time (WCET) estimates are a key component when designing and verifying real-time systems. One way to derive such estimates is by static WCET ...
Jan Gustafsson, Andreas Ermedahl, Björn Lispe...
138
Voted
IQIS
2005
ACM
15 years 7 months ago
Blocking-aware private record linkage
In this paper, the problem of quickly matching records (i.e., record linkage problem) from two autonomous sources without revealing privacy to the other parties is considered. In ...
Ali Al-Lawati, Dongwon Lee, Patrick McDaniel
IJCNLP
2005
Springer
15 years 7 months ago
Two-Phase Biomedical Named Entity Recognition Using A Hybrid Method
Biomedical named entity recognition (NER) is a difficult problem in biomedical information processing due to the widespread ambiguity of terms out of context and extensive lexical ...
Seonho Kim, Juntae Yoon, Kyung-Mi Park, Hae-Chang ...