Sciweavers

1675 search results - page 240 / 335
» A Structured Approach to Parallel Programming: Methodology a...
Sort
View
CTW
2006
88views more  CTW 2006»
15 years 4 months ago
Using multiple cognitive task analysis methods for supervisory control interface design in high-throughput biological screening
Cognitive task analysis (CTA) approaches are currently needed in many domains to provide explicit guidance on redesigning existing systems. This study used goal-directed task analy...
David B. Kaber, Noa Segall, Rebecca S. Green, K. E...
COMCOM
2006
283views more  COMCOM 2006»
15 years 4 months ago
Sleep scheduling for wireless sensor networks via network flow model
The pervasiveness and operational autonomy of mesh-based wireless sensor networks (WSNs) make them an ideal candidate in offering sustained monitoring functions at reasonable cost...
Rick W. Ha, Pin-Han Ho, Sherman X. Shen, Junshan Z...
NSPW
2006
ACM
15 years 10 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
CP
2007
Springer
15 years 10 months ago
Reformulating CSPs for Scalability with Application to Geospatial Reasoning
While many real-world combinatorial problems can be advantageously modeled and solved using Constraint Programming, scalability remains a major issue in practice. Constraint models...
Kenneth M. Bayer, Martin Michalowski, Berthe Y. Ch...
IEEESCC
2008
IEEE
15 years 11 months ago
Proactive Runtime Service Discovery
In this paper we describe a framework that supports runtime service discovery in both pull and push modes. Our framework supports service discovery based on structural and behavio...
Andrea Zisman, James Dooley, George Spanoudakis