Sciweavers

3524 search results - page 360 / 705
» Issues in Active Databases
Sort
View
HICSS
2008
IEEE
107views Biometrics» more  HICSS 2008»
15 years 11 months ago
Research on Constraints in Anti-Money Laundering (AML) Business Process in China Based on Theory of Constraints
Anti-money laundering is a pressing issue in today’s economy. With the newly launched Chinese anti-money laundering regulation, this issue has drawn more and more attention from...
Xuan Liu, Pengzhu Zhang
INFOCOM
2008
IEEE
15 years 11 months ago
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yuguang Fang
WIMOB
2008
IEEE
15 years 11 months ago
VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking
—Recently, mobile social software has become an active area of research and development. A multitude of systems have been proposed over the past years that try to follow the succ...
Marco von Arb, Matthias Bader, Michael Kuhn 0002, ...
CEC
2007
IEEE
15 years 11 months ago
A Utile Function Optimizer
Abstract— We recast the problem of unconstrained continuous evolutionary optimization as inference in a fixed graphical model. This approach allows us to address several pervasi...
Christopher K. Monson, Kevin D. Seppi, James L. Ca...
141
Voted
GLOBECOM
2007
IEEE
15 years 11 months ago
Using Type-of-Relationship (ToR) Graphs to Select Disjoint Paths in Overlay Networks
— Routing policies used in the Internet can be restrictive, limiting communication between source-destination pairs to one path, when often better alternatives exist. To avoid ro...
Sameer Qazi, Tim Moors