DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology Service provider and content aware network provider cross layer optimisation of multimedia...

1. SERVICE PROVIDER AND CONTENT AWARE NETWORK PROVIDER CROSS-LAYEROPTIMISATION OF MULTIMEDIA DISTRIBUTIONICME2011 Conference, WOMAN Workshop July 11 2011, Barcelona Eugen…

Business Usability Performance Benchmarks

1. Usability Performance BenchmarksFor the Voluntary Voting System Guidelines Prepared at the direction of the HFP Subcommittee of the TGDCAugust 17, 2007 This paper has…

Documents Learning to Question: Leveraging User Preferences for Shopping Advice Date : 2013/12/11 Author :...

Slide 1Learning to Question: Leveraging User Preferences for Shopping Advice Date : 2013/12/11 Author : Mahashweta Das, Aristides Gionis, Gianmarco De Francisci Morales,…

Documents David J. Teece, Gary Pisano and Amy Shuen (1997) Strategic Management Journal, Vol. 18:7 509-533.

Slide 1David J. Teece, Gary Pisano and Amy Shuen (1997) Strategic Management Journal, Vol. 18:7 509-533. Slide 2 Focus, Methods and Motivation of This Paper Focus: How do…

Documents How does financial innovation affect bank behavior? Evidence from credit markets Lars Norden...

Slide 1How does financial innovation affect bank behavior? Evidence from credit markets Lars Norden Consuelo Silva Buston Wolf Wagner Slide 2 Motivation There is an ongoing…

Technology An ahp (analytic hierarchy process)fce (fuzzy comprehensive evaluation) based multi-criteria...

1.International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.3, June 2014 DOI:10.5121/ijcsa.2014.4308 77 AN AHP (ANALYTIC HIERARCHY PROCESS)/FCE…

Business Ecce 1106-013-environmental-risk-compliance-for-nature-gas

1. Canadian Journal on Environmental, Construction and Civil Engineering Vol. 2, No. 5, June 2011Environmental Risk Compliance for Nature Gas Ship Design and OperationO.O.…

Technology Median And Beyond

1. Median and Beyond: New Aggregation Techniques for Sensor Networks EECS 600 Advanced Network Research, Spring 2005 Hongbo Jiang April 11, 2005 2. Context Introduction Background…

Software 2014.7.9 detecting p2 p botnets through network behavior analysis and machine learning

1. Detecting P2P Botnets through Network Behavior Analysis and Machine Learning Sherif Saad, Issa Traore et al. 2011 PST (Ninth Annual International Conference on Privacy,…

Education Living in a contaminated estuary - behavioral changes and ecological consequences for five species

1. Living in a Contaminated Estuary: Behavioral Changes and Ecological Consequences for Five Species Wang Chao 30 Sep. 2013 2. Publishing Authors: Judith S. Weis, Lauren…