Sciweavers

1617 search results - page 248 / 324
» Recommender Systems
Sort
View
IFIP
2010
Springer
15 years 2 months ago
Drivers of B2B Software Purchase Decisions
. Organizations are increasingly turning to large, enterprise-wide software systems as potential solutions to managing complex business-to-business (B2B) relationships. These syste...
Claudia Loebbecke, Thomas Weiss, Philip Powell, Ch...
CDC
2010
IEEE
106views Control Systems» more  CDC 2010»
15 years 12 days ago
Optimal cross-layer wireless control policies using TD learning
We present an on-line crosslayer control technique to characterize and approximate optimal policies for wireless networks. Our approach combines network utility maximization and ad...
Sean P. Meyn, Wei Chen, Daniel O'Neill
CDC
2010
IEEE
116views Control Systems» more  CDC 2010»
15 years 12 days ago
Dynamic reconfiguration of terminal airspace during convective weather
Dynamic airspace configuration (DAC) algorithms strive to restructure the U.S. National Airspace System (NAS) in ways that allow air traffic control to better manage aircraft flows...
Diana Michalek, Hamsa Balakrishnan
CHI
2011
ACM
14 years 9 months ago
Of passwords and people: measuring the effect of password-composition policies
Text-based passwords are the most common mechanism for authenticating humans to computer systems. To prevent users from picking passwords that are too easy for an adversary to gue...
Saranga Komanduri, Richard Shay, Patrick Gage Kell...
VEE
2012
ACM
200views Virtualization» more  VEE 2012»
14 years 28 days ago
Block storage virtualization with commodity secure digital cards
Smartphones, tablets and other mobile platforms typically accommodate bulk data storage with low-cost, FAT-formatted Secure Digital cards. When one uses a mobile device to run a f...
Harvey Tuch, Cyprien Laplace, Kenneth C. Barr, Bi ...