Sciweavers

4447 search results - page 814 / 890
» Service Interaction Patterns
Sort
View
WWW
2001
ACM
16 years 5 months ago
Personalizing E-commerce applications with on-line heuristic decision making
This paper describes new technology based on on-line decision support for providing personalized customer treatments in web-based storefronts and information sites. The central im...
Vinod Anupam, Richard Hull, Bharat Kumar
MOBISYS
2008
ACM
16 years 4 months ago
Sixthsense: rfid-based enterprise intelligence
RFID is widely used to track the movement of goods through a supply chain. In this paper, we extend the domain of RFID by presenting SixthSense, a platform for RFID-based enterpri...
Lenin Ravindranath, Venkata N. Padmanabhan, Piyush...
145
Voted
WSDM
2010
ACM
214views Data Mining» more  WSDM 2010»
16 years 2 months ago
You are who you know: Inferring user profiles in Online Social Networks
Online social networks are now a popular way for users to connect, express themselves, and share content. Users in today's online social networks often post a profile, consis...
Alan Mislove, Bimal Viswanath, P. Krishna Gummadi,...
ICDCS
2009
IEEE
16 years 1 months ago
File Versioning for Block-Level Continuous Data Protection
Block-level continuous data protection (CDP) logs every disk block update so that disk updates within a time window are undoable. Standard file servers and DBMS servers can enjoy...
Maohua Lu, Tzi-cker Chiueh
ICC
2009
IEEE
115views Communications» more  ICC 2009»
15 years 11 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...