Sciweavers

4360 search results - page 732 / 872
» Socio-technical systems: From design methods to systems engi...
Sort
View
ADBIS
2004
Springer
147views Database» more  ADBIS 2004»
15 years 6 months ago
A Hybrid Keyword Search across Peer-to-Peer Federated Databases
The need for Keyword search in databases is suggested both by Web integration with legacy database management system and by dynamic Web publication. However, it sacrifices the inh...
Jungkee Kim, Geoffrey Fox
84
Voted
GECCO
2004
Springer
119views Optimization» more  GECCO 2004»
15 years 6 months ago
Learning Environment for Life Time Value Calculation of Customers in Insurance Domain
A critical success factor in Insurance business is its ability to use information sources and contained knowledge in the most effective way. Its profitability is obtained through t...
Andrea Tettamanzi, Luca Sammartino, Mikhail Simono...
98
Voted
HICSS
1994
IEEE
152views Biometrics» more  HICSS 1994»
15 years 4 months ago
Simple COMA Node Implementations
Shared memory architectures often have caches to reduce the number of slow remote memory accesses. The largest possible caches exist in shared memory architectures called Cache-On...
Erik Hagersten, Ashley Saulsbury, Anders Landin
CHIMIT
2007
ACM
15 years 4 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
132
Voted
DAMON
2006
Springer
15 years 4 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...