Sciweavers

7366 search results - page 212 / 1474
» Development of the Information Systems Implementation Resear...
Sort
View
CHI
2008
ACM
16 years 5 months ago
Implementing eye-based user-aware e-learning
We propose an e-learning scenario where eye tracking is exploited to get valuable data about user behavior. What we look at -- as well as how we do that -- can in fact be used to ...
Marco Porta
CANPC
1999
Springer
15 years 9 months ago
Implementing Application-Specific Cache-Coherence Protocols in Configurable Hardware
Streamlining communication is key to achieving good performance in shared-memory parallel programs. While full hardware support for cache coherence generally offers the best perfo...
David Brooks, Margaret Martonosi
126
Voted
COMPSEC
2010
142views more  COMPSEC 2010»
15 years 1 months ago
Provably correct Java implementations of Spi Calculus security protocols specifications
Spi Calculus is an untyped high level modeling language for security protocols, used for formal protocols specification and verification. In this paper, a type system for the Spi ...
Alfredo Pironti, Riccardo Sisto
ATAL
2008
Springer
15 years 7 months ago
Using SOA Provenance to Implement Norm Enforcement in e-Institutions
In the last 10 years several approaches and technologies other than MAS (such as Web services and Grid computing) have emerged, with the support of the industry, providing their o...
Javier Vázquez-Salceda, Sergio Álvar...
JSS
2006
118views more  JSS 2006»
15 years 5 months ago
Assessment of eco-security in the Knowledge Grid e-science environment
Ecological security is an important basis of the entire human security system, the cornerstone for human survival. Knowing the status of ecological security is crucial for making ...
Xiaoqing Shi, Jingzhu Zhao, Ouyang Zhiyun