Sciweavers

659 search results - page 85 / 132
» Binding as sets of scopes
Sort
View
75
Voted
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
15 years 7 months ago
Redefining and Measuring Virtual Work in Teams: An Application of Social Network Analysis
For several decades organizational researchers have explored the practice of using electronic technology to communicate when team members work physically apart from each other. Ye...
Priscilla Arling
103
Voted
SECURWARE
2007
IEEE
15 years 6 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
102
Voted
ATAL
2007
Springer
15 years 6 months ago
ARTS: agent-oriented robust transactional system
This paper presents the ARTS (Agent-oriented Robust Transactional System) model, which applies transaction concepts to provide agent developers with high-level support for agent s...
Mingzhong Wang, Amy Unruh, Kotagiri Ramamohanarao
110
Voted
BPM
2007
Springer
130views Business» more  BPM 2007»
15 years 6 months ago
Process Mining Based on Clustering: A Quest for Precision
Process mining techniques attempt to extract non-trivial and useful information from event logs recorded by information systems. For example, there are many process mining techniqu...
Ana Karla Alves de Medeiros, Antonella Guzzo, Gian...
FASE
2007
Springer
15 years 6 months ago
An Approach to Software Evolution Based on Semantic Change
The analysis of the evolution of software systems is a useful source of information for a variety of activities, such as reverse engineering, maintenance, and predicting the future...
Romain Robbes, Michele Lanza, Mircea Lungu