Sciweavers

7530 search results - page 1387 / 1506
» Design and Implementation of the YAWL System
Sort
View
ATAL
2008
Springer
14 years 12 months ago
Mobile opportunistic commerce: mechanisms, architecture, and application
We present mechanisms, architectures, and an implementation addressing challenges with mobile opportunistic commerce centering on markets and mechanisms that support the procureme...
Ece Kamar, Eric Horvitz, Chris Meek
TSE
2008
131views more  TSE 2008»
14 years 9 months ago
Enhancing an Application Server to Support Available Components
Three-tier middleware architecture is commonly used for hosting enterprise-distributed applications. Typically, the application is decomposed into three layers: front end, middle t...
Achmad I. Kistijantoro, Graham Morgan, Santosh K. ...
MOBISYS
2008
ACM
15 years 9 months ago
Virtual trip lines for distributed privacy-preserving traffic monitoring
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...
MOBISYS
2008
ACM
15 years 9 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
ISBRA
2010
Springer
15 years 4 months ago
Modeling without Borders: Creating and Annotating VCell Models Using the Web
Biological research is becoming increasingly complex and data-rich, with multiple public databases providing a variety of resources: hundreds of thousands of substances and interac...
Michael L. Blinov, Oliver Ruebenacker, James C. Sc...
« Prev « First page 1387 / 1506 Last » Next »