Sciweavers

614 search results - page 30 / 123
» aime 2003
Sort
View
FC
2005
Springer
109views Cryptology» more  FC 2005»
15 years 5 months ago
Fraud Within Asymmetric Multi-hop Cellular Networks
At Financial Cryptography 2003, Jakobsson, Hubaux, and Butty´an suggested a lightweight micro-payment scheme aimed at encouraging routing collaboration in asymmetric multi-hop cel...
Gildas Avoine
ACSAC
2003
IEEE
15 years 5 months ago
Synthesizing Test Data for Fraud Detection Systems
This paper reports an experiment aimed at generating synthetic test data for fraud detection in an IP based videoon-demand service. The data generation verifies a methodology pre...
Emilie Lundin Barse, Håkan Kvarnström, ...
ICAT
2003
IEEE
15 years 5 months ago
i-ball 2: An Interaction Platform with a Crystal-Ball-Like Display for Multiple Users
The authors’ aim in this work is to develop an easy-to-use computer-human interaction (CHI) platform. In this paper, i-ball 2 (interactive/information ball 2) is introduced as a...
Keita Ushida, Hiroshi Harashima, Jun Ishikawa
IDEAS
2003
IEEE
106views Database» more  IDEAS 2003»
15 years 5 months ago
Frequent Itemsets Mining for Database Auto-Administration
With the wide development of databases in general and data warehouses in particular, it is important to reduce the tasks that a database administrator must perform manually. The a...
Kamel Aouiche, Jérôme Darmont, Le Gru...
STEP
2003
IEEE
15 years 5 months ago
Incorporating Quality Requirements in Software Migration Process
The reengineering of legacy software systems to modern Object Oriented platforms has received significant attention over the past few years. However, most often the reengineering ...
Ying Zou