32,491 Hits in 4.7 sec

Page 424 of The Journal of Applied Ecology Vol. 43, Issue 3 [page]

2006 The Journal of Applied Ecology  
In particular, ecological niche models based on machine-learning algorithms for estimating the support of a statistical distribution provide a promising new approach to identifying species’ potential distributions  ...  The ecological niche is a fundamental biological concept.  ... 

Using Knowledge-Based E-mail System to Support Office Workflow Management: A Scenario-Based Approach

Liquin Hwang, Kunihigo Higa
2001 Pacific Asia Conference on Information Systems  
This paper presents a scenario-based approach for message management, which provides an alternative to knowledge-based mail system in support office workflow management.  ...  Computer-based information technologies and the communication they facilitate are the essential foundations for supporting and managing distributed work teams.  ...  In case that a user is applying a documentary act that starts a new workflow, the parameters f and m will be verified corresponding to the desired documentary act.  ... 
dblp:conf/pacis/HwangH01 fatcat:ukyissb5xjhjtnjdu4hxojy2ee

A Role Based Trust Model for Peer to Peer Systems Using Credential Trees

Chithra Selvaraj, Sheila Anand
2011 Journal of clean energy technologies  
RT is a Trust Management framework for P2P networks where access control decisions are based on policy statements, called credentials, made by different principals and stored in a distributed manner.  ...  Credential trees overcome the cyclic dependency problem of credential graphs which may lead to non-termination. The credential trees are used for evaluating trust relationships.  ...  (e-mail: Several trust-management systems have been proposed in A Role Based Trust Model for Peer to Peer Systems Using Credential Trees Chithra Selvaraj and Sheila Anand, IEEE Senior  ... 
doi:10.7763/ijcte.2011.v3.310 fatcat:67ozzpwfqzfjxiiz4nt5cfziii

The Uncertainty of Identity Toolset

Muhammad Adnan, Antonio Lima, Luca Rossi, Suresh Veluru, Paul Longley, Mirco Musolesi, Muttukrishnan Rajarajan
2014 Proceedings of the 7th International Conference on Security of Information and Networks - SIN '14  
This paper presents the Uncertainty of Identity Toolset, a framework for the identification and profiling of users from their social media accounts and e-mail addresses.  ...  People manage a spectrum of identities in cyber domains.  ...  We also like to thank Jens Kendt from UCL Department of Geography for helping us in the production of maps for the E-mail Address Profiler tool.  ... 
doi:10.1145/2659651.2659741 dblp:conf/sin/AdnanLRVLMR14 fatcat:rb3smdz2lvgcbgca73camw5cpu

Actual Condition and Issues for Mobile Security System

Kouichi Sakurai, Kazuhide Fukushima
2007 Journal of Information Processing Systems  
The high-speed mobile Internet has recently been expanded, many attractive services are provided. However, these services require some form of security-related technology.  ...  This paper outlines Japanese mobile services and exposits some mobile security topics including mobile spam, mobile malware, mobile DRM system, mobile WiMAX security, and mobile key management.  ...  Spam mail is a big issue for all the mobile users as well as PC users. Content distribution service needs digital right management (DRM) system to protect the copyright of content.  ... 
doi:10.3745/jips.2008.3.2.054 fatcat:ipq2gx2dcjfojdmgmtp6owvv3y

An Exploratory Study into Automated Real-Time Categorisation of Engineering E-Mail

James A. Gopsill, Stephen J. Payne, Ben J. Hicks
2013 2013 IEEE International Conference on Systems, Man, and Cybernetics  
For large, spatially and temporally distributed engineering projects, e-mail is a central means for the discussion of engineering work and sharing of digital assets that define the product and its production  ...  While the techniques have only been applied to an initial exploratory study of 98 e-mails, the results suggest the potential for automated real-time categorisation of engineering e-mails through achieving  ...  ACKNOWLEDGMENT The work reported in this paper has been undertaken as part of the Language of Collaborative Manufacturing Project 3 at the University of Bath & University of Bristol, which has support  ... 
doi:10.1109/smc.2013.818 dblp:conf/smc/GopsillPH13 fatcat:xjruikv5afcvffqae4dmenqtju

A Knowledge-Based E-Mail System Using Semantic Categorization And Rating Mechanisms

Azleena Mohd Kassim, Muhamad Rashidi A. Rahman, Yu-N. Cheah
2008 Zenodo  
For this purpose, we present the KS-Mail architecture, and elaborate on the details of the e-mail server and the application server.  ...  At the application level, we have also built components like the service manager, evaluation engine and search engine to handle the e-mail processes efficiently by providing the means to share and reuse  ...  This happens whenever a new e-mail is created or received. This opens a whole new emailing experience for the user from a knowledge management point of view.  ... 
doi:10.5281/zenodo.1082187 fatcat:rclekrcxojg6jlp6vwpjzli7ru

Self-Optimised Tree Overlays Using Proximity-Driven Self-Organised Agents [chapter]

Evangelos Pournaras, Martijn Warnier, Frances M. T. Brazier
2010 Complex Intelligent Systems and Their Applications  
The evaluation of AETOS in different simulation settings shows that it provides high connectivity in tree overlays optimised according to application requirements.  ...  Self-organisation is the approach taken in this chapter. AETOS, the Adaptive Epidemic Tree Overlay Service, provides tree overlays on demand.  ...  Acknowledgements The authors are grateful to the NLnet Foundation and Delft University of Technology, for their support.  ... 
doi:10.1007/978-1-4419-1636-5_7 fatcat:lgxmln75qfhjfp4t5zlstl6tvm

Distributed configuration management using composite objects and constraints

T Coatta, G Neufeld
1994 Distributed Systems Engineering  
Distributed programming has transformed applications into federations of cooperating components.  ...  Mail routers forward mail, moving it closer to its destination. Altering routing tables in a mail router may improve performance or may cause loss of connectivity in ,the mail system.  ...  For example, the facilities of a tool such as make are provided using the same underlying concepts as those used for providing network management services.  ... 
doi:10.1088/0967-1846/1/5/004 fatcat:fa27uzaiyjbx3mcs2jvkuw55vu

A Case-Based Component Selection Framework for Mobile Context-Aware Applications

Fan Dong, Li Zhang, Dexter H. Hu, Cho-Li Wang
2009 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications  
E-mail softwares ported to CAPC.  ...  As a proof of concept, we developed and evaluated a context-aware personal communicator (CAPC) application using adaptive component selection, with a synthesized execution trace obtained from real-life  ...  with the E-mail program.  ... 
doi:10.1109/ispa.2009.110 dblp:conf/ispa/DongZHW09 fatcat:vprd5z7dkvcffj5sehp5dmkmwi

Object Instrumentation for Distributed Applications Management [chapter]

A. Schade, P. Trommler, M. Kaiserswerth
1996 Distributed Platforms  
Distributed systems create a new class of requirements especially in the areas of installation, consistent configuration, fault detection, and management exceeding what is necessary for stand-alone application  ...  This paper proposes a method to support. t he development of manageable distributed applications based on a formal management interface definition and an instrumentation library.  ...  Name bindings for each instance of such a template form the Management Information Tree (MIT), that provides the concept of relative distinguished names for managed objects as the instances of their actual  ... 
doi:10.1007/978-0-387-34947-3_14 fatcat:7eqcouketvdn3dud53xqnu7bai

Survey examines the adoption of perceived best management practices for almond nutrition

Sara E. Lopus, María Paz Santibáñez, Robert H. Beede, Roger A. Duncan, John Edstrom, Franz J. A. Niederholzer, Cary J. Trexler, Patrick H. Brown
2008 California Agriculture  
While the survey results suggested broad compliance with the bestavailable management practices and are likely to indicate good nutrientuse efficiency, they also suggested that growers are uncertain about  ...  The majority of respondents, particularly those with large almond acreages, used fertigation to apply nitrogen; applied nitrogen coincident with periods of maximal plant demand; and collected annual tissue  ...  To assess fertilizer nitrogen use in almond orchards, we compared current grower practices with our set of theoretical best-management practices derived from existing knowledge, focus groups, e-mail consultations  ... 
doi:10.3733/ca.v064n03p149 fatcat:nn2jzenmh5hdthir5q3fgyys5q

On the Convergence of Distributed Computing and Telecommunications in the Field of Personal Communications [chapter]

T. Eckardt, T. Magedanz, T. Pfeifer
1995 Informatik aktuell  
a generic way for a broad range of telecommunication services.  ...  This paper presents and discusses the major trends in two important areas: distributed mobile computing and personal telecommunications.  ...  The developments in the area of PDAs are the main driving force for the evolution of new service platforms specially designed for the exchange of e-mails and new active types of mail.  ... 
doi:10.1007/978-3-642-79561-9_5 dblp:conf/kivs/EckardtMP95 fatcat:spwp5baljjhv7m3ylx4juzf2iy

Research of Distributed Query and Optimization Method Based on Metadata

Huaiyuan Wang
2015 Open Automation and Control Systems Journal  
A method of distributed query based on metadata, which uses metadata to define and manage the virtual table containing key information of the data source, has been studied in this paper.  ...  Then, in view of the different data level, designed two different data solutions based on query and optimization, for applying to common data and huge data respectively.  ...  , which can lead the relations in a tree to a full reduction state.  ... 
doi:10.2174/1874444301507011759 fatcat:j2o4lmgwhncb3iby3hosjdnpsm


Ingo Mierswa, Michael Wurst, Ralf Klinkenberg, Martin Scholz, Timm Euler
2006 Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '06  
After a discussion of the key concepts of Yale, we illustrate the advantages of rapid prototyping for KDD on case studies ranging from data pre-processing to result visualization.  ...  Yale provides a rich variety of methods which allows rapid prototyping for new applications and makes costly re-implementations unnecessary.  ...  , or e-mail routing, i.e. the automatic forwarding of e-mail messages to the most appropriate person or department in a company or organization.  ... 
doi:10.1145/1150402.1150531 dblp:conf/kdd/MierswaWKSE06 fatcat:6oz263ifqjdrdbse6dtixb7kza
« Previous Showing results 1 — 15 out of 32,491 results