NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Destounis, P.; Garofalakis, J.; Kappos, P.; Tzimas, J. – Internet Research, 2001
Presents a case study that calculates the reduction of the time needed for a Web page to be fully downloaded and delivered to the user. Topics include bandwidth; HTTP; data transfer; algorithms for compression and decompression of Web pages; and reducing the size of hypertext data. (Author/LRW)
Descriptors: Algorithms, Case Studies, Hypermedia, Measurement Techniques
Peer reviewed Peer reviewed
Li, Heng; Tang, Sandy; Man, K. F.; Love, Peter E. D. – Internet Research, 2002
Describes an intelligent Web-based construction project management system called VHBuild.com which integrates project management, knowledge management, and artificial intelligence technologies. Highlights include an information flow model; time-cost optimization based on genetic algorithms; rule-based drawing interpretation; and a case-based…
Descriptors: Algorithms, Artificial Intelligence, Construction Management, Construction Programs
Peer reviewed Peer reviewed
Boley, Daniel; Gini, Maria; Hastings, Kyle; Mobasher, Bamshad; Moore, Jerry – Internet Research, 1998
Describes WebACE, the architecture of a client-side agent that explores and classifies Web documents in clusters automatically and discusses the details of the algorithms within its key components. Highlights principal direction divisive partitioning (PDDP), a scalable hierarchical clustering algorithm; compares it to other clustering methods; and…
Descriptors: Algorithms, Automation, Classification, Cluster Grouping
Peer reviewed Peer reviewed
Diamond, Ted – Internet Research, 1994
The federal Escrowed Encryption Standard (EES) has been opposed by civil liberties advocates and the computer industry. The author argues that the standard does not threaten privacy as long as its use remains voluntary, alternative forms of encryption are allowed, and the power of government to intercept transmission is kept in check. (20…
Descriptors: Algorithms, Civil Liberties, Coding, Computer Networks