Sciweavers

9588 search results - page 56 / 1918
» Service Value Networks
Sort
View
I3E
2001
121views Business» more  I3E 2001»
15 years 1 months ago
An Adoption Framework for Mobile Commerce
: Most often, technological explanations are given of Europe's slow adoption of mobile commerce. When seeking non-technological explanations, diffusion models provide aggregat...
Per E. Pedersen
PE
2002
Springer
207views Optimization» more  PE 2002»
14 years 11 months ago
Delay characteristics in discrete-time GI-G-1 queues with non-preemptive priority queueing discipline
Priority scheduling for packets is becoming a hot topic, as attemps are being made to integrate voice services in existing data networks. In this paper, we consider a discrete-tim...
Joris Walraevens, Bart Steyaert, Herwig Bruneel
ATAL
2004
Springer
15 years 5 months ago
Agent-Based Peer-to-Peer Service Networks: A Study of Effectiveness and Structure Evolution
We study peer-to-peer service networks consisting of autonomous agents who seek and provide services. To fulfill its local needs, an agent attempts to discover and select informa...
Yathiraj B. Udupi, Pinar Yolum, Munindar P. Singh
CP
2009
Springer
16 years 15 days ago
Failed Value Consistencies for Constraint Satisfaction
In constraint satisfaction, basic inferences rely on some properties of constraint networks, called consistencies, that allow the identification of inconsistent instantiations (als...
Christophe Lecoutre, Olivier Roussel
COMCOM
2007
100views more  COMCOM 2007»
14 years 12 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia