Sciweavers

2500 search results - page 477 / 500
» Specifying Behavior in C
Sort
View
HICSS
2003
IEEE
214views Biometrics» more  HICSS 2003»
15 years 5 months ago
An Event Driven Approach to Customer Relationship Management in e-Brokerage Industry
Customer Relationship Management (CRM) is critical to the success of a business. Recent work in CRM has focused on the mining of customer-related data and the construction of cust...
Dickson K. W. Chiu, Wesley C. W. Chan, Gary K. W. ...
77
Voted
HICSS
2003
IEEE
202views Biometrics» more  HICSS 2003»
15 years 5 months ago
Adoption Process of Upgrading Software: An Empirical Study of Windows XP
There are many studies in Information Systems on the adoption of new innovations. This paper, on the other hand, presents the findings of an empirical study, which explores factor...
Michael C. L. Lai, Susanna S. Y. Ho, Wendy W. Y. H...
ISLPED
2003
ACM
115views Hardware» more  ISLPED 2003»
15 years 5 months ago
Reducing energy and delay using efficient victim caches
In this paper, we investigate methods for improving the hit rates in the first level of memory hierarchy. Particularly, we propose victim cache structures to reduce the number of ...
Gokhan Memik, Glenn Reinman, William H. Mangione-S...
MSWIM
2003
ACM
15 years 5 months ago
Markov-based modeling of wireless local area networks
Errors introduced by a wireless medium are more frequent and profound than contemporary wired media. Some of these errors, which are not corrected by the physical layer, result in...
Syed A. Khayam, Hayder Radha
NSPW
2003
ACM
15 years 5 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...