Sciweavers

3276 search results - page 146 / 656
» Data Management for Pervasive Computing
Sort
View
GI
2009
Springer
15 years 2 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
166
Voted
PERCOM
2007
ACM
16 years 4 months ago
Automatic Generation of Device User-Interfaces?
One of the visions of pervasive computing is using mobile computers to interact with networked devices. A question raised by this vision is: Should the userinterfaces of these dev...
Olufisayo Omojokun, Prasun Dewan
CAD
2000
Springer
15 years 4 months ago
Managing digital libraries for computer-aided design
This paper describes our initial efforts to deploy a digital library to support computer-aided collaborative design. At present, this experimental testbed, The Engineering Design ...
William C. Regli, Vincent A. Cicirello
JDCTA
2010
163views more  JDCTA 2010»
14 years 11 months ago
Predictive Analysis for Customer Relationship Management
The approach for predictive analysis focuses on a business strategy to streamline business-customer relationships in order to maximize client satisfaction and thereby improve cust...
Manisha Rathi, Anand Priyadarshini, Ankit Rastogi
CHI
2003
ACM
16 years 4 months ago
Taking email to task: the design and evaluation of a task management centered email tool
Email has come to play a central role in task management, yet email tool features have remained relatively static in recent years, lagging behind users' evolving practices. T...
Victoria Bellotti, Nicolas Ducheneaut, Mark Howard...