Sciweavers

4135 search results - page 788 / 827
» Application Modeling for the Semantic Web
Sort
View
ENTCS
2002
145views more  ENTCS 2002»
14 years 11 months ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
JSS
1998
139views more  JSS 1998»
14 years 11 months ago
Human-computer interaction: Interdisciplinary roots and trends
Methodology, theory, and practice in the ®eld of Human±Computer Interaction (HCI) all share the goal of producing interactive software that can be used eciently, e€ectively, ...
H. Rex Hartson
SIGMETRICS
1998
ACM
14 years 11 months ago
Internet service performance failure detection
The increasing complexity of computer networks and our increasing dependence on them means enforcing reliability requirements is both more challenging and more critical. The expan...
Amy R. Ward, Peter W. Glynn, Kathy J. Richardson
JDI
2010
84views more  JDI 2010»
14 years 10 months ago
XML-Based DICOM Data Format
y was conducted by Cong Yu and Zhihong Yao. The abstract of the study is as follows: To enhance the readability, improve the structure, and facilitate the sharing of digital imag...
Cong Yu 0002, Zhihong Yao
ECAI
2010
Springer
14 years 9 months ago
Social Recommendation with Interpersonal Influence
Social recommendation, that an individual recommends an item to another, has gained popularity and success in web applications such as online sharing and shopping services. It is l...
Junming Huang, Xueqi Cheng, Jiafeng Guo, Huawei Sh...