Sciweavers

26472 search results - page 5194 / 5295
» Interactive
Sort
View
114
Voted
EAAI
2007
87views more  EAAI 2007»
15 years 3 months ago
Experience-based service provider selection in agent-mediated E-Commerce
For a given service demand, it is necessary to select a suitable service provider among many possibilities. An accurate selection is difficult when consumers do not have a signi...
Murat Sensoy, F. Canan Pembe, Hande Zirtiloglu, Pi...
EJIS
2007
140views more  EJIS 2007»
15 years 3 months ago
External Web content and its influence on organizational performance
Research into the Internet has experienced a tremendous growth within the field of information systems. In this sense, the recent literature focuses on more complex research topic...
Ángel Meroño-Cerdan, Pedro Soto-Acos...
113
Voted
JOC
2006
69views more  JOC 2006»
15 years 3 months ago
Characterization of Security Notions for Probabilistic Private-Key Encryption
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptogr...
Jonathan Katz, Moti Yung
ENTCS
2007
113views more  ENTCS 2007»
15 years 3 months ago
Modular Checkpointing for Atomicity
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Philip Schatz, Suresh Jagannathan
JSAC
2006
174views more  JSAC 2006»
15 years 3 months ago
Integrated Radio Resource Allocation for Multihop Cellular Networks With Fixed Relay Stations
Recently, the notion that a logical next step towards future mobile radio networks is to introduce multihop relaying into cellular networks, has gained wide acceptance. Nevertheles...
Yajian Liu, Reza Hoshyar, X. Yang, Rahim Tafazolli
« Prev « First page 5194 / 5295 Last » Next »