Sciweavers

5107 search results - page 1014 / 1022
» Design Issue Of ECTST
Sort
View
JASIS
2006
164views more  JASIS 2006»
14 years 9 months ago
A study of interface support mechanisms for interactive information retrieval
Advances in search technology have meant that search systems can now offer assistance to users beyond simply retrieving a set of documents. For example, search systems are now cap...
Ryen W. White, Ian Ruthven
JCO
2006
106views more  JCO 2006»
14 years 9 months ago
Reliable Ad Hoc Routing Based on Mobility Prediction
Reliability is a very important issue in Mobile Ad hoc NETworks (MANETs). Shortest paths are usually used to route packets in MANETs. However, a shortest path may fail quickly, bec...
Jian Tang, Guoliang Xue, Weiyi Zhang
JUCS
2008
115views more  JUCS 2008»
14 years 9 months ago
Capturing Interaction Requirements in a Model Transformation Technology Based on MDA
: Currently, many models are used to capture functional software requirements. However, the Software Engineering community has faded interaction requirements into the background, d...
José Ignacio Panach, Sergio España, ...
JUCS
2008
162views more  JUCS 2008»
14 years 9 months ago
Composition and Run-time Adaptation of Mismatching Behavioural Interfaces
Abstract: Reuse of software entities such as components or Web services raise composition issues since, most of the time, they present mismatches in their interfaces. These mismatc...
Javier Cámara, Gwen Salaün, Carlos Can...
JUCS
2008
113views more  JUCS 2008»
14 years 9 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
« Prev « First page 1014 / 1022 Last » Next »