Sciweavers

669 search results - page 96 / 134
» Managing the Risk of IT Outsourcing
Sort
View
WSC
2007
15 years 5 days ago
A model for contact center analysis and simulation
In this paper we depart from a set of simple assumptions regarding the behavior of a pool of customers associated with an enterprise’s contact center. We assume that the pool of...
Juan M. Huerta
CORR
2006
Springer
141views Education» more  CORR 2006»
14 years 10 months ago
Ideas by Statistical Mechanics (ISM)
Ideas by Statistical Mechanics (ISM) is a generic program to model evolution and propagation of ideas/patterns throughout populations subjected to endogenous and exogenous interac...
Lester Ingber
SIGIR
2002
ACM
14 years 9 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny
NSPW
2006
ACM
15 years 3 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
EWSN
2008
Springer
15 years 9 months ago
Resilient Coding Algorithms for Sensor Network Data Persistence
Storing and disseminating coded information instead of the original data can bring significant performance improvements to sensor network protocols. Such methods reduce the risk of...
Daniele Munaretto, Jörg Widmer, Michele Rossi...