The Internet Archive has digitized a microfilm copy of this work. It may be possible to borrow a copy for reading.
Filters
Page 424 of The Journal of Applied Ecology Vol. 43, Issue 3
[page]
2006
The Journal of Applied Ecology
In particular, ecological niche models based on machine-learning algorithms for estimating the support of a statistical distribution provide a promising new approach to identifying species’ potential distributions ...
The ecological niche is a fundamental biological concept. ...
Using Knowledge-Based E-mail System to Support Office Workflow Management: A Scenario-Based Approach
2001
Pacific Asia Conference on Information Systems
This paper presents a scenario-based approach for message management, which provides an alternative to knowledge-based mail system in support office workflow management. ...
Computer-based information technologies and the communication they facilitate are the essential foundations for supporting and managing distributed work teams. ...
In case that a user is applying a documentary act that starts a new workflow, the parameters f and m will be verified corresponding to the desired documentary act. ...
dblp:conf/pacis/HwangH01
fatcat:ukyissb5xjhjtnjdu4hxojy2ee
A Role Based Trust Model for Peer to Peer Systems Using Credential Trees
2011
Journal of clean energy technologies
RT is a Trust Management framework for P2P networks where access control decisions are based on policy statements, called credentials, made by different principals and stored in a distributed manner. ...
Credential trees overcome the cyclic dependency problem of credential graphs which may lead to non-termination. The credential trees are used for evaluating trust relationships. ...
(e-mail: sanijava@yahoo.com)
Several trust-management systems have been proposed in A Role Based Trust Model for Peer to Peer Systems Using Credential Trees Chithra Selvaraj and Sheila Anand, IEEE Senior ...
doi:10.7763/ijcte.2011.v3.310
fatcat:67ozzpwfqzfjxiiz4nt5cfziii
The Uncertainty of Identity Toolset
2014
Proceedings of the 7th International Conference on Security of Information and Networks - SIN '14
This paper presents the Uncertainty of Identity Toolset, a framework for the identification and profiling of users from their social media accounts and e-mail addresses. ...
People manage a spectrum of identities in cyber domains. ...
We also like to thank Jens Kendt from UCL Department of Geography for helping us in the production of maps for the E-mail Address Profiler tool. ...
doi:10.1145/2659651.2659741
dblp:conf/sin/AdnanLRVLMR14
fatcat:rb3smdz2lvgcbgca73camw5cpu
Actual Condition and Issues for Mobile Security System
2007
Journal of Information Processing Systems
The high-speed mobile Internet has recently been expanded, many attractive services are provided. However, these services require some form of security-related technology. ...
This paper outlines Japanese mobile services and exposits some mobile security topics including mobile spam, mobile malware, mobile DRM system, mobile WiMAX security, and mobile key management. ...
Spam mail is a big issue for all the mobile users as well as PC users. Content distribution service needs digital right management (DRM) system to protect the copyright of content. ...
doi:10.3745/jips.2008.3.2.054
fatcat:ipq2gx2dcjfojdmgmtp6owvv3y
An Exploratory Study into Automated Real-Time Categorisation of Engineering E-Mail
2013
2013 IEEE International Conference on Systems, Man, and Cybernetics
For large, spatially and temporally distributed engineering projects, e-mail is a central means for the discussion of engineering work and sharing of digital assets that define the product and its production ...
While the techniques have only been applied to an initial exploratory study of 98 e-mails, the results suggest the potential for automated real-time categorisation of engineering e-mails through achieving ...
ACKNOWLEDGMENT The work reported in this paper has been undertaken as part of the Language of Collaborative Manufacturing Project 3 at the University of Bath & University of Bristol, which has support ...
doi:10.1109/smc.2013.818
dblp:conf/smc/GopsillPH13
fatcat:xjruikv5afcvffqae4dmenqtju
A Knowledge-Based E-Mail System Using Semantic Categorization And Rating Mechanisms
2008
Zenodo
For this purpose, we present the KS-Mail architecture, and elaborate on the details of the e-mail server and the application server. ...
At the application level, we have also built components like the service manager, evaluation engine and search engine to handle the e-mail processes efficiently by providing the means to share and reuse ...
This happens whenever a new e-mail is created or received. This opens a whole new emailing experience for the user from a knowledge management point of view. ...
doi:10.5281/zenodo.1082187
fatcat:rclekrcxojg6jlp6vwpjzli7ru
Self-Optimised Tree Overlays Using Proximity-Driven Self-Organised Agents
[chapter]
2010
Complex Intelligent Systems and Their Applications
The evaluation of AETOS in different simulation settings shows that it provides high connectivity in tree overlays optimised according to application requirements. ...
Self-organisation is the approach taken in this chapter. AETOS, the Adaptive Epidemic Tree Overlay Service, provides tree overlays on demand. ...
Acknowledgements The authors are grateful to the NLnet Foundation and Delft University of Technology, for their support. http://www.nlnet.nl. ...
doi:10.1007/978-1-4419-1636-5_7
fatcat:lgxmln75qfhjfp4t5zlstl6tvm
Distributed configuration management using composite objects and constraints
1994
Distributed Systems Engineering
Distributed programming has transformed applications into federations of cooperating components. ...
Mail routers forward mail, moving it closer to its destination. Altering routing tables in a mail router may improve performance or may cause loss of connectivity in ,the mail system. ...
For example, the facilities of a tool such as make are provided using the same underlying concepts as those used for providing network management services. ...
doi:10.1088/0967-1846/1/5/004
fatcat:fa27uzaiyjbx3mcs2jvkuw55vu
A Case-Based Component Selection Framework for Mobile Context-Aware Applications
2009
2009 IEEE International Symposium on Parallel and Distributed Processing with Applications
E-mail softwares ported to CAPC. ...
As a proof of concept, we developed and evaluated a context-aware personal communicator (CAPC) application using adaptive component selection, with a synthesized execution trace obtained from real-life ...
with the E-mail program. ...
doi:10.1109/ispa.2009.110
dblp:conf/ispa/DongZHW09
fatcat:vprd5z7dkvcffj5sehp5dmkmwi
Object Instrumentation for Distributed Applications Management
[chapter]
1996
Distributed Platforms
Distributed systems create a new class of requirements especially in the areas of installation, consistent configuration, fault detection, and management exceeding what is necessary for stand-alone application ...
This paper proposes a method to support. t he development of manageable distributed applications based on a formal management interface definition and an instrumentation library. ...
Name bindings for each instance of such a template form the Management Information Tree (MIT), that provides the concept of relative distinguished names for managed objects as the instances of their actual ...
doi:10.1007/978-0-387-34947-3_14
fatcat:7eqcouketvdn3dud53xqnu7bai
Survey examines the adoption of perceived best management practices for almond nutrition
2008
California Agriculture
While the survey results suggested broad compliance with the bestavailable management practices and are likely to indicate good nutrientuse efficiency, they also suggested that growers are uncertain about ...
The majority of respondents, particularly those with large almond acreages, used fertigation to apply nitrogen; applied nitrogen coincident with periods of maximal plant demand; and collected annual tissue ...
To assess fertilizer nitrogen use in almond orchards, we compared current grower practices with our set of theoretical best-management practices derived from existing knowledge, focus groups, e-mail consultations ...
doi:10.3733/ca.v064n03p149
fatcat:nn2jzenmh5hdthir5q3fgyys5q
On the Convergence of Distributed Computing and Telecommunications in the Field of Personal Communications
[chapter]
1995
Informatik aktuell
a generic way for a broad range of telecommunication services. ...
This paper presents and discusses the major trends in two important areas: distributed mobile computing and personal telecommunications. ...
The developments in the area of PDAs are the main driving force for the evolution of new service platforms specially designed for the exchange of e-mails and new active types of mail. ...
doi:10.1007/978-3-642-79561-9_5
dblp:conf/kivs/EckardtMP95
fatcat:spwp5baljjhv7m3ylx4juzf2iy
Research of Distributed Query and Optimization Method Based on Metadata
2015
Open Automation and Control Systems Journal
A method of distributed query based on metadata, which uses metadata to define and manage the virtual table containing key information of the data source, has been studied in this paper. ...
Then, in view of the different data level, designed two different data solutions based on query and optimization, for applying to common data and huge data respectively. ...
, which can lead the relations in a tree to a full reduction state. ...
doi:10.2174/1874444301507011759
fatcat:j2o4lmgwhncb3iby3hosjdnpsm
After a discussion of the key concepts of Yale, we illustrate the advantages of rapid prototyping for KDD on case studies ranging from data pre-processing to result visualization. ...
Yale provides a rich variety of methods which allows rapid prototyping for new applications and makes costly re-implementations unnecessary. ...
, or e-mail routing, i.e. the automatic forwarding of e-mail messages to the most appropriate person or department in a company or organization. ...
doi:10.1145/1150402.1150531
dblp:conf/kdd/MierswaWKSE06
fatcat:6oz263ifqjdrdbse6dtixb7kza
« Previous
Showing results 1 — 15 out of 32,491 results