Sciweavers

2562 search results - page 124 / 513
» The Use of B2B Process Standards: A Case Study
Sort
View
ECIS
2004
14 years 11 months ago
Evaluation of phenomenological findings in IS research: a study in developing web-based IS
This paper presents a phenomenological investigation of project managers' experiences with the implementation of web-based employee service systems (ESS), a domain that has w...
Pradipta K. Sarkar, Jacob L. Cybulski
ICDM
2007
IEEE
187views Data Mining» more  ICDM 2007»
15 years 4 months ago
A Comparative Study of Methods for Transductive Transfer Learning
The problem of transfer learning, where information gained in one learning task is used to improve performance in another related task, is an important new area of research. While...
Andrew Arnold, Ramesh Nallapati, William W. Cohen
JCIT
2010
146views more  JCIT 2010»
14 years 4 months ago
Determing Performance of Choreography-based Composite Services
Web Service Choreography Description Language is a main-stream standard for the description of peer-to-peer collaborations for the participants for service composition. To predict...
Yunni Xia, Zhe Ouyang, Yanxin Wu, Ruilong Yang
MSWIM
2006
ACM
15 years 3 months ago
The power of choice in random walks: an empirical study
In recent years different authors have proposed the used of random-walk-based algorithms for varying tasks in the networking community. These proposals include searching, routing...
Chen Avin, Bhaskar Krishnamachari
JCS
1998
338views more  JCS 1998»
14 years 9 months ago
Intrusion Detection Using Sequences of System Calls
A method is introducted for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a g...
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaj...