Sciweavers

5577 search results - page 160 / 1116
» E2K Technology and Implementation
Sort
View
FOSAD
2007
Springer
15 years 5 months ago
Trusted Mobile Platforms
This article addresses two main topics. Firstly, we review the operation of trusted computing technology, which now appears likely to be implemented in future mobile devices (inclu...
Eimear Gallery, Chris J. Mitchell
IFIP
1999
Springer
15 years 3 months ago
Virtual environments in educational networks
: The field of Virtual Environments (VEs) is rapidly evolving into a new means of communication and accessing information, likely to overcome many existent technologies. However, b...
Christos Bouras, Agisilaos Konidaris, Afrodite Sev...
ECOOP
1998
Springer
15 years 3 months ago
Orthogonal to the Java Imperative
Three nontrivial limitations of the existing JavaT M technology are considered from the viewpoint of object-oriented database technology. The limitations are: lack of support for o...
Suad Alagic, Jose Solorzano, David Gitchell
JSS
2002
84views more  JSS 2002»
14 years 11 months ago
The impact of component architectures on interoperability
Component interoperability has become an important concern as companies migrate legacy systems, integrate COTS products, and assemble modules from disparate sources into a single ...
Leigh A. Davis, Rose F. Gamble, Jamie Payton
JTAER
2008
116views more  JTAER 2008»
14 years 11 months ago
Disruptions in Information Flow: A Revenue Costing Supply Chain Dilemma
The integration of supply chains as a mechanism for value creation is largely dependent on continuous flow of real time accurate information from the customer back upstream to the...
Albert Munoz, Michael D. Clements